Careers in Cyber - TryHackMe

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

What is the main role of a security analyst?

To construct security measures across organisations and protect the company from attacks.

2
New cards

What do security analysts evaluate to make recommendations?

Company networks, to uncover actionable data for engineers to develop preventative measures.

3
New cards

Why do security analysts collaborate with stakeholders?

To understand the company's security requirements and the broader security landscape.

4
New cards

What kind of reports do security analysts compile?

Ongoing reports documenting network safety, security issues, and responses taken.

5
New cards

What do security analysts include in their security plans?

Research on new attack tools, trends, and cross-team security measures needed to maintain data security.

6
New cards

What is the main role of a security analyst?

To construct security measures across organisations and protect the company from attacks.

7
New cards

What do security analysts evaluate to make recommendations?

Company networks, to uncover actionable data for engineers to develop preventative measures.

8
New cards

Why do security analysts collaborate with stakeholders?

To understand the company's security requirements and the broader security landscape.

9
New cards

What kind of reports do security analysts compile?

Ongoing reports documenting network safety, security issues, and responses taken.

10
New cards

What do security analysts include in their security plans?

Research on new attack tools, trends, and cross-team security measures needed to maintain data security.

11
New cards

What is the main role of a security engineer?

To develop and implement security solutions using threat and vulnerability data.

12
New cards

Where do security engineers often get their threat data from?

Members of the security workforce.

13
New cards

What types of attacks do security engineers work to prevent?

Web application attacks, network threats, and evolving attack trends and tactics.

14
New cards

What is the ultimate goal of a security engineer?

To retain and adopt security measures to reduce the risk of attack and data loss.

15
New cards

What is one responsibility of a security engineer?

Testing and screening security measures across software.

16
New cards

How do security engineers maintain security?

By monitoring networks and reports to update systems and mitigate vulnerabilities.

17
New cards

What do security engineers implement for optimal security?

Systems needed to strengthen and maintain security across the organisation.

18
New cards

What is the main role of a security analyst?

To construct security measures across organisations and protect the company from attacks.

19
New cards

What do security analysts evaluate to make recommendations?

Company networks, to uncover actionable data for engineers to develop preventative measures.

20
New cards

Why do security analysts collaborate with stakeholders?

To understand the company's security requirements and the broader security landscape.

21
New cards

What kind of reports do security analysts compile?

Ongoing reports documenting network safety, security issues, and responses taken.

22
New cards

What do security analysts include in their security plans?

Research on new attack tools, trends, and cross-team security measures needed to maintain data security.

23
New cards

What is the main role of a security engineer?

To develop and implement security solutions using threat and vulnerability data.

24
New cards

Where do security engineers often get their threat data from?

Members of the security workforce.

25
New cards

What types of attacks do security engineers work to prevent?

Web application attacks, network threats, and evolving attack trends and tactics.

26
New cards

What is the ultimate goal of a security engineer?

To retain and adopt security measures to reduce the risk of attack and data loss.

27
New cards

What is one responsibility of a security engineer?

Testing and screening security measures across software.

28
New cards

How do security engineers maintain security?

By monitoring networks and reports to update systems and mitigate vulnerabilities.

29
New cards

What do security engineers implement for optimal security?

Systems needed to strengthen and maintain security across the organisation.

30
New cards

What is the primary role of an incident responder?

To respond efficiently to security breaches and protect the company's data, reputation, and financial standing.

31
New cards

What do incident responders create to guide actions during and after a breach?

Plans, policies, and protocols for incident response.

32
New cards

Why is incident response often a high-pressure role?

Because it requires real-time assessments and actions as attacks unfold.

33
New cards

What are the three key incident response metrics?

MTTD (Mean Time to Detect), MTTA (Mean Time to Acknowledge), MTTR (Mean Time to Recover).

34
New cards

What is the goal of incident response?

To achieve swift, effective responses and minimize financial and reputational damage.

35
New cards

What is one key responsibility of incident responders?

Developing and adopting a thorough, actionable incident response plan.

36
New cards

How do incident responders help the company prepare for the future?

Through post-incident reporting and implementing lessons learned to improve future response.

37
New cards

What do incident responders maintain to support strong incident handling?

Strong security best practices and response measures.

38
New cards

What type of mindset is ideal for a Digital Forensics Investigator?

Someone who enjoys playing detective and solving complex problems.

39
New cards

What is the primary goal of forensic analysts in law enforcement?

To collect and analyze evidence to charge the guilty and exonerate the innocent.

40
New cards

How do forensic analysts help companies?

By analyzing incidents like policy violations to defend the network.

41
New cards

What is a key responsibility involving evidence?

Collect digital evidence while observing legal procedures.

42
New cards

How do forensic analysts use collected data?

To analyze digital evidence and find answers related to the case.

43
New cards

What must forensic analysts do after completing an investigation?

Document findings and report on the case.

44
New cards

What is the primary task of a malware analyst?

To analyze suspicious programs, discover their actions, and write reports on the findings.

45
New cards

Why are malware analysts sometimes called reverse-engineers?

Because they convert compiled programs from machine language to readable code.

46
New cards

What programming skills are essential for a malware analyst?

A strong background in low-level languages such as assembly language and C language.

47
New cards

What is the ultimate goal of a malware analyst?

To understand the activities of a malicious program, detect it, and report findings.

48
New cards

What is static analysis in malware analysis?

It involves reverse-engineering the malicious program without running it.

49
New cards

What is dynamic analysis in malware analysis?

It involves observing the activities of malware in a controlled environment.

50
New cards

What must malware analysts do after completing their analysis?

Document and report all the findings.

51
New cards

What is another name for penetration testing?

Pentesting or ethical hacking.

52
New cards

What is the main role of a penetration tester?

To test the security of systems and software by attempting to uncover flaws and vulnerabilities.

53
New cards

How do penetration testers evaluate risk?

By exploiting vulnerabilities to see how much damage a real attack could cause.

54
New cards

Why do companies hire penetration testers?

To identify and fix vulnerabilities before a real-world cyberattack occurs.

55
New cards

What are three key tasks of a penetration tester?

Conduct tests on systems, perform audits and assessments, and analyze policies.

56
New cards

What is the goal of penetration testing?

To provide insights and recommendations for preventing cyberattacks.

57
New cards

What is the main difference between red teamers and penetration testers?

Red teamers test detection and response capabilities, while penetration testers look for broad vulnerabilities.

58
New cards

What is the primary job of a red teamer?

To emulate cyber criminals and test how well a company can detect and respond to attacks.

59
New cards

How long can a red team assessment last?

Up to a month.

60
New cards

Who usually conducts red team assessments?

An external team.

61
New cards

What are three core responsibilities of a red teamer?

Emulate threat actors, assess security and incident response, and provide actionable reports.

62
New cards

What kind of organisations are best suited for red team assessments?

Organisations with mature security programs.