Pre Exam: Fundamentals of Information Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:19 AM on 5/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

71 Terms

1
New cards

What is the purpose of authorization in data security?

Controlling access to resources

2
New cards

What is the goal of ensuring integrity in data security?

Ensuring data is not altered

3
New cards

What is an example of an availability failure in data security?

Interruption of access to website services

4
New cards

How can encryption contribute to maintaining confidentiality in data security?

By securing data from unauthorized access

5
New cards

Which example shows authentication in data security?

Entering a username and password when logging into an online banking site

6
New cards

What does non-repudiation mean in data security?

Preventing users from denying their actions

7
New cards

How does multi-factor authentication (MFA) improve security?

By requiring multiple forms of verification for access to resources

8
New cards

Which attack surface is targeted by exploiting vulnerabilities in web applications?

Software attack surface

9
New cards

What is an example of an insider threat?

An employee accidentally sharing sensitive information

10
New cards

What is the purpose of a worm in cybersecurity?

To replicate itself and spread to other computers

11
New cards

What is the purpose of log monitoring in data security?

To analyze systems for suspicious activity

12
New cards

What is a mitigation strategy for insider threats?

Monitoring employee activities

13
New cards

What is the purpose of an incident response plan?

To outline the steps to take before and after a data breach

14
New cards

What is the primary purpose of a firewall in a network security context?

To monitor and filter incoming and outgoing network traffic

15
New cards

What is the purpose of role-based access control (RBAC)?

To restrict privileges based on a user's role in the organization

16
New cards

Which example illustrates a requirement under FISMA?

A federal agency implements continuous monitoring of its information systems

17
New cards

What will PCI DSS help a store achieve?

Secure customers' payment card data

18
New cards

What is a core function of the NIST Cybersecurity Framework?

To help organizations understand their security risks

19
New cards

Which NIST function is risk assessment and inventory?

Identify

20
New cards

How does a cryptographic hash contribute to blockchain security?

It protects data from being tampered with

21
New cards

How does modularity affect software security maintenance?

Modularity allows for targeted updates and fixes

22
New cards

Which technique replaces sensitive data with non-sensitive equivalents?

Tokenization

23
New cards

Which practice verifies software authenticity with a certificate?

Code signing

24
New cards

Which technique verifies data integrity?

Checksums

25
New cards

How can a company ensure integrity of transferred files?

Use checksums/hashing

26
New cards

Which best practice is vetting cloud services continuously?

Vetting and monitoring third-party components

27
New cards

How does fuzz testing identify vulnerabilities?

It sends malformed data to an application

28
New cards

Why are peer reviews important?

They identify bugs and vulnerabilities missed by developers

29
New cards

What is an automated method to enhance code security without running code?

Static analysis tools

30
New cards

What can CWE help organizations do?

Identify and address software vulnerabilities

31
New cards

Which standard is SSDF?

NIST SP 800-218

32
New cards

Which standard provides security controls for federal systems?

NIST SP 800-53

33
New cards

What attack injects malicious code into a database?

SQL injection

34
New cards

What weakness allows attackers to alter logs?

Insufficient logging and monitoring

35
New cards

How does microservice misconfiguration affect cloud security?

It can lead to unauthorized access to sensitive data

36
New cards

What should remote workers use for secure access?

VPN (IPSec)

37
New cards

How does signature-based IDS protect networks?

By comparing traffic against known threat patterns

38
New cards

How can companies protect network communications?

Using secure protocols like HTTPS/IPSec

39
New cards

What does rate limiting help prevent?

Network congestion

40
New cards

Why implement redundant systems?

To support continuous service availability during an attack

41
New cards

What is the purpose of ARP spoofing?

To intercept and manipulate network traffic

42
New cards

How can IP spoofing attacks be prevented?

By analyzing network traffic for inconsistencies

43
New cards

What vulnerability is common in IoT devices?

Hardcoded passwords

44
New cards

What law protects electronic communications?

ECPA

45
New cards

What is the purpose of FERPA?

To safeguard student privacy

46
New cards

How does CFAA address societal needs?

By deterring cybercrime with legal repercussions

47
New cards

What is the purpose of SOX?

To enhance corporate responsibility and transparency

48
New cards

Which law protects student records access?

FERPA

49
New cards

Which law requires internal controls to prevent fraud?

SOX

50
New cards

Which law regulates financial data use?

GLBA

51
New cards

Which law applies to EU personal data?

GDPR

52
New cards

What type of attack impersonates executives for fraud?

Whaling

53
New cards

How can organizations protect against whaling?

Using email authentication mechanisms

54
New cards

What is smishing?

A social engineering attack using fraudulent text messages

55
New cards

What is the goal of pretexting?

To deceive targets into revealing confidential information

56
New cards

What is an example of corporate espionage?

A competitor stealing trade secrets

57
New cards

What attack involves holding a door open for unauthorized entry?

Piggybacking

58
New cards

What does the identification phase of IRP do?

Determines the nature and scope of an incident

59
New cards

What is an example of a technical control?

Multi-factor authentication

60
New cards

What policy component handles breaches?

Security incident response plan

61
New cards

What policy component involves password rules?

User responsibilities

62
New cards

What do employee cybersecurity trainings represent?

User responsibilities

63
New cards

Which phase involves risk management planning?

Identify

64
New cards

Which phase involves forensic analysis after incident?

Respond

65
New cards

What best practice is demonstrated by MFA + modern systems?

Risk mitigation

66
New cards

What proactive measure helps against DDoS?

Rate limiting

67
New cards

What best practice limits dev access to needed resources?

Access controls

68
New cards

What best practice uses drills for ransomware readiness?

Incident response planning

69
New cards

Which standard establishes ISMS?

ISO/IEC 27001

70
New cards

Which standard guides VPN configuration?

NIST SP 800-77

71
New cards

What is a key aspect of NIST SP 800-53?

Security and privacy controls