Cybersecurity Fundamentals – Module 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

Fill-in-the-blank flashcards covering key definitions, concepts, roles, skills, and statistics from Cybersecurity Course 1, Module 1.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Cybersecurity is the practice of __ data, people, and systems from unauthorized access or harm.

protecting

2
New cards

The three core goals of information security, known collectively as the CIA triad, are __, __, and __.

Confidentiality, Integrity, Availability

3
New cards

__ means keeping data private and accessible only to authorized users.

Confidentiality

4
New cards

__ means ensuring data remains accurate, complete, and unaltered.

Integrity

5
New cards

__ means making sure systems and information are accessible whenever they are needed.

Availability

6
New cards

A __ is any person or group that tries to cause harm to systems, data, or people.

threat actor

7
New cards

Phishing emails, malware, and data-breach attempts are examples of __ threats.

external

8
New cards

Risks created by employees, ex-employees, or vendors are called __ threats.

internal

9
New cards

Following laws such as GDPR or HIPAA to avoid fines is known as __.

regulatory compliance

10
New cards

Keeping operations running after an attack is an aspect of __.

business continuity

11
New cards

A security analyst’s main mission is to __, detect, respond, and recover.

protect

12
New cards

The three day-to-day responsibilities of a security analyst are to protect systems, prevent threats, and __ security regularly.

audit

13
New cards

Ethical hacking that deliberately probes a company’s own defenses is called __ testing.

penetration

14
New cards

A __ is a systematic ‘health check’ that reviews records, activities, and policies to verify security.

security audit

15
New cards

Working with IT teams to install security software and build safe systems is an example of __ threat prevention.

proactive

16
New cards

Strong security saves money by reducing __ and downtime.

data-loss recovery costs

17
New cards

Job titles like Security Analyst, Cybersecurity Specialist, SOC Analyst, and Information Security Analyst all focus on protecting __.

information assets (or data and systems)

18
New cards

Veronica’s help-desk experience taught her troubleshooting and debugging, which are examples of __ skills.

transferable

19
New cards

Cybersecurity welcomes people without a college degree as long as they show __ and a willingness to learn.

curiosity

20
New cards

Nikki works on __ threat detection, which focuses on spotting suspicious behavior by employees.

insider

21
New cards

Step-by-step guides that tell analysts how to handle detections are called __.

playbooks

22
New cards

The defensive ‘blue team’ protects systems, while the offensive ‘red team’ tries to __ security flaws.

find (or exploit)

23
New cards

Entry-level __ focus on day-to-day operations and incident response.

security analysts

24
New cards

__ follow laws and corporate rules to maintain security and avoid penalties.

Compliance practices (or simply Compliance)

25
New cards

__ are blueprints or guidelines that help organizations plan how to handle threats.

Security frameworks

26
New cards

Passwords, firewalls, and MFA are examples of security __.

controls

27
New cards

A company’s overall readiness to defend itself is called its security __.

posture

28
New cards

__ security protects data, devices, and systems inside the corporate network from outsiders.

Network

29
New cards

__ security ensures data stored on internet-based servers is configured correctly and accessed only by authorized users.

Cloud

30
New cards

Knowing a programming language like Python helps analysts __ repetitive tasks such as scanning for threats.

automate

31
New cards

Clear writing and speaking that translate complex risks for non-technical audiences demonstrate strong __ skills.

communication

32
New cards

Working with engineers, ethical hackers, and project managers shows the importance of __ in cybersecurity.

collaboration

33
New cards

Breaking down complex problems to recommend protective measures is an example of __ thinking.

analytical

34
New cards

Prioritizing urgent alerts over routine tasks illustrates good __ management.

time

35
New cards

Tools that collect and analyze system-event data for threat detection are known as __ tools.

SIEM (Security Information and Event Management)

36
New cards

Systems that monitor networks for unauthorized access and alert analysts are called __.

IDS (Intrusion Detection Systems)

37
New cards

The structured approach taken when handling a security breach is called __ response.

incident

38
New cards

Data such as full name, date of birth, or email address is categorized as __.

PII (Personally Identifiable Information)

39
New cards

Social Security numbers, medical records, and biometric data are examples of __.

SPII (Sensitive PII)

40
New cards

Using stolen personal information to impersonate someone for fraud is known as __ theft.

identity

41
New cards

According to the U.S. Bureau of Labor Statistics, cybersecurity roles are projected to grow by over __ percent by 2030.

30

42
New cards

Any condition that could harm systems, people, or data is called a __.

threat

43
New cards

Installing software that blocks malicious code before it executes is an example of __ prevention.

malware

44
New cards

During security audits, analysts use __ tools to better understand threats and vulnerabilities.

SIEM

45
New cards

Thinking carefully and thoroughly when monitoring systems or mitigating risk exemplifies __ thinking.

analytical