IAS Gclass Act 1-4

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/109

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:01 AM on 5/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

110 Terms

1
New cards

Which is an example of QC?

Running test cases

2
New cards

QA is considered

Process-oriented

3
New cards

Which SDLC phase focuses on defining security requirements?

Requirements Analysis

4
New cards

Ignoring security until the end is

Reactive approach

5
New cards

Which is a qualitative risk assessment?

Low, Medium, High classification

6
New cards

Which is an example of a vulnerability?

Outdated software

7
New cards

Which step involves identifying valuable resources?

Asset identification

8
New cards

Which is an example of QA?

Code review guidelines

9
New cards

In security context, QC ensures

Vulnerabilities are detected

10
New cards

Choosing secure architecture happens in

Design

11
New cards

Risk is commonly defined as

Threat x Vulnerability x Impact

12
New cards

Quality Assurance focuses on

Preventing defects

13
New cards

A penetration test reveals vulnerabilities. This is

QC

14
New cards

What is the primary goal of integrating security into SDLC?

Ensure security is built into every phase

15
New cards

Continuous risk assessment means

Regularly updating risk evaluations

16
New cards

Shift Left Security means

Moving security practices earlier in development

17
New cards

Integrating QA, QC, and risk assessment ensures

Strong information assurance

18
New cards

What does impact refer to in risk analysis?

Damage caused if risk occurs

19
New cards

A system lacks input validation. This issue occurs in

Development

20
New cards

Which is considered an asset?

Customer data

21
New cards

Why is early risk assessment important?

It reduces future security issues

22
New cards

QC is considered

Product-focused

23
New cards

Which approach integrates development, security, and operations?

DevSecOps

24
New cards

Which principle ensures users only have access to what they need?

Least Privilege

25
New cards

Which is the best mitigation for plain text passwords?

Encrypt passwords

26
New cards

What is risk mitigation?

Reducing risk through controls

27
New cards

Monitoring system logs is part of

Maintenance

28
New cards

Quality Control focuses on

Product inspection

29
New cards

Which best describes Information Assurance in SDLC?

Protecting information by maintaining confidentiality, integrity, and availability

30
New cards

Which occurs BEFORE defects happen?

QA

31
New cards

In security context, QA ensures

Secure processes are followed

32
New cards

Which factor determines likelihood?

Probability of threat occurrence

33
New cards

No firewall was configured during release. This is a problem in

Deployment

34
New cards

Which occurs AFTER development?

QC

35
New cards

Which is a proactive security strategy?

Designing secure systems from the start

36
New cards

What is the main focus of secure coding practices?

Preventing vulnerabilities

37
New cards

Identifying hackers as possible attackers is

Threat identification

38
New cards

Encrypting sensitive data is an example of

Control

39
New cards

Which activity is part of the maintenance phase?

Monitoring and patching systems

40
New cards

Developers follow secure coding standards. This is an example of

QA

41
New cards

A company has strong firewalls but experiences frequent server theft. What is lacking?

Physical security controls

42
New cards

A server overheats despite strict access control. Which area is weak?

Environmental security

43
New cards

Employees repeatedly fall for phishing attacks despite training. What is the most likely issue?

Ineffective awareness reinforcement

44
New cards

A company implements only environmental controls. What risk remains highest?

Unauthorized access

45
New cards

Which combination provides the most balanced security approach?

Integrated physical, environmental, and human controls

46
New cards

A breach occurred due to tailgating. Which control failed?

Physical access control

47
New cards

A company invests heavily in education but lacks training. What is the likely gap?

Practical skills

48
New cards

A system failure occurs during a power outage. Which control is missing?

UPS or generator

49
New cards

Which situation shows imbalance in A.T.E implementation?

No ongoing learning updates

50
New cards

If employees know policies but fail to apply them, what is lacking?

Training

51
New cards

A company installs biometric scanners to secure server rooms. This addresses

Physical access risks

52
New cards

A data center adds a UPS system. This helps mitigate

Power interruption

53
New cards

Employees receive phishing awareness emails. This is an example of

Awareness

54
New cards

IT staff undergo firewall configuration training. This represents

Training

55
New cards

A company installs fire suppression systems. This addresses

Environmental hazards

56
New cards

Security guards monitor entry points. This primarily supports

Physical security

57
New cards

Air conditioning in a server room prevents

Equipment overheating

58
New cards

A phishing simulation exercise is best classified as

Training

59
New cards

A cybersecurity degree program contributes to

Education

60
New cards

A company conducts monthly security updates. This is

Continuous learning

61
New cards

Installing CCTV cameras helps in

Access monitoring

62
New cards

A water leak detection system protects against

Environmental damage

63
New cards

Access control cards are used to

Authenticate entry

64
New cards

Which best defines physical security controls?

Measures that prevent unauthorized physical access

65
New cards

What is the main goal of environmental controls?

Maintain safe operating conditions

66
New cards

Awareness programs are designed to

Promote security-conscious behavior

67
New cards

Which learning type is structured and curriculum-based?

Formal learning

68
New cards

Role-based learning focuses on

Job-specific training

69
New cards

Simulation-based learning involves

Real-world scenarios

70
New cards

Installing generators ensures

Power continuity

71
New cards

Why is anomaly-based detection often considered more difficult to implement than signature-based detection?

It requires baselines and analysis of normal behavior patterns

72
New cards

A security team needs to detect possible DDoS attacks targeting the company network. Which monitoring tool would best address this need?

NIDS because it analyzes suspicious traffic patterns across the network

73
New cards

A company wants an early warning system capable of studying real attacker behavior. Which monitoring approach is most appropriate?

Deploying a Honeypot to gather threat intelligence

74
New cards

Why is a layered monitoring strategy generally more effective than relying on a single monitoring tool?

A single tool cannot provide visibility across all security areas

75
New cards

A company relies only on NIDS for monitoring. Which security gap is most likely to remain unresolved?

Failure to detect host-level attacks and insider activities

76
New cards

Which detection method identifies attacks by comparing activities against known attack patterns?

Signature-Based Detection

77
New cards

A system administrator needs to monitor unauthorized changes to important server files. Which tool should be deployed?

HIDS because it monitors file system changes on hosts

78
New cards

A monitoring system frequently generates alerts for harmless user activities. Which monitoring challenge does this situation represent?

False Positives

79
New cards

A company wants to detect suspicious traffic patterns and port scanning attempts at its gateway. Which solution is most appropriate?

NIDS because it monitors packet flows and network behavior

80
New cards

Which monitoring tool specifically focuses on observing traffic across an entire network?

Network Intrusion Detection System (NIDS)

81
New cards

What is the primary purpose of Information Assurance Monitoring?

To continuously observe and analyze system and network activities for threats

82
New cards

An organization plans to deploy a high-interaction honeypot. Which concern should security analysts evaluate most carefully?

The honeypot could be exploited as a launchpad for attacks

83
New cards

An organization wants visibility into user activity and privilege escalation attempts on employee computers. Which tool is most suitable?

HIDS because it analyzes host-level activities

84
New cards

Which tool is mainly used to attract attackers and analyze their techniques and behavior?

Honeypot

85
New cards

A company's security operations center is able to review suspicious activities at any time of the day. Which benefit is illustrated?

Continuous Monitoring

86
New cards

An organization combines NIDS, HIDS, honeypots, malware detection tools, and vulnerability scanners. Which strategy are they applying?

Defense-in-Depth Layered Monitoring

87
New cards

Certain network activities are not being fully inspected by the monitoring system. Which limitation does this represent?

Encrypted Traffic Blind Spots

88
New cards

Which feature is considered a major strength of HIDS?

Providing deep visibility into host-level activities

89
New cards

A cybersecurity team wants to collect intelligence about attacker behavior without exposing real company assets. Which tool is best?

Honeypot because it acts as a decoy system for attackers

90
New cards

A company wants to identify missing patches and software misconfigurations before an attack occurs. Which tool should they use?

Vulnerability Scanner because it identifies security weaknesses proactively

91
New cards

Which statement best describes cyber espionage?

A covert digital operation intended to obtain confidential information

92
New cards

Which factor has significantly increased the attractiveness of organizations to cyber espionage attackers?

The expansion of digital storage for sensitive information

93
New cards

Which cyber espionage technique primarily relies on influencing human behavior?

Social engineering

94
New cards

Which layer of the internet is intentionally hidden and commonly associated with anonymous activities?

Dark Web

95
New cards

Which technology enables systems to recognize patterns and make automated decisions?

Artificial Intelligence

96
New cards

An employee unknowingly submits login credentials through a deceptive email. Which preventive strategy would most effectively reduce similar incidents?

Conducting phishing awareness training for employees

97
New cards

A company wants to strengthen account protection even if user passwords become exposed. Which solution would best address this concern?

Multi-factor authentication

98
New cards

A smart home security camera still uses its default manufacturer password months after installation. Which security issue is most likely to result?

Unauthorized remote access to the device

99
New cards

A cybersecurity team needs a system capable of identifying suspicious activity across massive amounts of network traffic in real time. Which approach would be most effective?

AI-based threat detection systems

100
New cards

A corporation wants to minimize the possibility of attackers exploiting known software weaknesses. Which action should be prioritized?

Performing regular software and firmware updates