Omega 11 PLus

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/121

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:49 PM on 4/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

122 Terms

1
New cards

What are the four types of security controls?

Physical, Managerial, Technical, Operational.

2
New cards

What does Physical Control include?

Alarms, gateways, locks, lighting, and security cameras.

3
New cards

What is the primary function of a CISO?

Managing security-related incident response.

4
New cards

What is a Corrective Control?

Eliminates or reduces the impact of a security policy violation after an attack.

5
New cards

What is the difference between CISO and CIO?

CISO manages security teams; CIO oversees equipment and infrastructure.

6
New cards

What approaches can a CISO take to assess security posture?

Implement a gap analysis report.

7
New cards

What is non-repudiation?

Ensures that individuals cannot deny their actions, such as modifications or data access.

8
New cards

What are the functions of the NIST Cybersecurity Framework?

Identify, Protect, Detect, Respond.

9
New cards

What does IAM stand for?

Identity and Access Management.

10
New cards

Explain Multi-factor Authentication (MFA).

Requires users to provide two or more verification factors.

11
New cards

What is a Data Loss Prevention (DLP) solution?

Monitors and controls sensitive information across networks.

12
New cards

What is the CIA Triad?

Confidentiality, Integrity, and Availability.

13
New cards

What is the purpose of a vulnerability scan?

Identify weaknesses in the information systems.

14
New cards

Define Zero-Day Vulnerability.

A previously unknown vulnerability that has not yet been fixed.

15
New cards

What is the role of a Security Operations Center (SOC)?

Monitor and protect against security threats in an organization.

16
New cards

What does the acronym SSL stand for?

Secure Sockets Layer.

17
New cards

What is the function of an Intrusion Prevention System (IPS)?

Detect and prevent identified threats actively.

18
New cards

What is a firewall's role in network security?

Control incoming and outgoing network traffic based on predetermined security rules.

19
New cards

Describe a DDoS attack.

A Distributed Denial of Service attack aims to make a service unavailable by overwhelming it with traffic.

20
New cards

Explain Role-Based Access Control (RBAC).

Allows access based on a user's role within an organization.

21
New cards

What is the primary goal of penetration testing?

Identify vulnerabilities and suggest improvements.

22
New cards

PuTTY

A secure client program used for command line access in Windows.

23
New cards

FTP

File Transfer Protocol, a standard for transferring files, but not secure unless using secure versions.

24
New cards

SFTP

Secure File Transfer Protocol, uses the secure shell protocol for file transfer.

25
New cards

HTTP

Hypertext Transfer Protocol, operates over port 80 and does not use encryption.

26
New cards

HTTPS

Hypertext Transfer Protocol Secure, operates over port 443 and uses encryption for secure communication.

27
New cards

Transport Layer Security (TLS)

A protocol that provides privacy and data integrity between two communicating applications.

28
New cards

Digital Certificates

Used to verify the identity of websites and facilitate secure communications.

29
New cards

Advanced Encryption Standard (AES)

A symmetric encryption algorithm widely used for securing data.

30
New cards

Secure Socket Layer (SSL)

A standard technology for keeping an internet connection secure and safeguarding any sensitive data.

31
New cards

Lightweight Directory Access Protocol (LDAP)

An application protocol for accessing and maintaining distributed directory information services.

32
New cards

Simple Network Management Protocol (SNMP)

A protocol for managing devices on IP networks, with a version that supports encryption.

33
New cards

Data Loss Prevention (DLP)

A strategy to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

34
New cards

Sender Policy Framework (SPF)

An email validation system that helps to prevent spam by verifying sender IP addresses.

35
New cards

Domain-Based Message Authentication, Reporting, and Conformance (DMARC)

An email-authentication protocol that helps protect domains from being used in email spoofing.

36
New cards

Uniform Resource Locator (URL) Encoding

A way to encode characters in a URL to ensure they are transmitted correctly.

37
New cards

Sandboxing

Running code in a controlled environment to test its behavior and detect malicious actions.

38
New cards

Code Signing

The process of digitally signing to verify the authenticity and integrity of software.

39
New cards

Input Validation

The practice of checking data inputs to ensure they are appropriate and safe before processing.

40
New cards

Encryption Algorithms

Mathematical procedures for encrypting data to ensure privacy and security in communication.

41
New cards

Quantum Computing

A type of computing that promises to solve problems beyond the reach of classical computers, posing threats to current encryption methods.

42
New cards

Endpoint

A component or device capable of sending, receiving, storing, or processing information.

43
New cards

Hardening

The process of changing default configurations to enhance security on endpoint devices.

44
New cards

Principle of Least Privilege

A security principle stating that users, systems, or services should have only the minimum level of access necessary to perform their tasks.

45
New cards

Zero Trust

A security model that requires verification of every request, regardless of whether the request originates from inside or outside the network.

46
New cards

EDR (Endpoint Detection and Response)

A cybersecurity technology designed to detect, investigate, and respond to threats on endpoint devices.

47
New cards

HIDS

Host-based Intrusion Detection System; a security solution that monitors and analyzes the internals of a computing system for suspicious activities.

48
New cards

NIDS

Network-based Intrusion Detection System; a security solution that monitors network traffic for malicious activities.

49
New cards

Access Control Lists (ACLs)

A set of rules that are used to determine who can access or use resources in a computing environment.

50
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access.

51
New cards

VPN (Virtual Private Network)

A technology that creates a secure connection over a less secure network, such as the internet.

52
New cards

BYOD (Bring Your Own Device)

A policy allowing employees to use their personal devices for work purposes.

53
New cards

COBO (Corporate Owned Business Only)

A model where an enterprise provides employees with devices that are strictly for business use.

54
New cards

Mobile Device Management (MDM)

A software solution used to track, manage, and secure mobile devices used in business environments.

55
New cards

Wi-Fi Direct

A feature that allows devices to connect to each other without using a wireless access point.

56
New cards

SE Linux

Security-Enhanced Linux; a set of kernel modifications and user-space tools that enhance the security of the operating system.

57
New cards

Firmware

The permanent software programmed into a read-only memory, which provides low-level control for the device's specific hardware.

58
New cards

Time Lag

The delay experienced in data transmission, often unnoticed due to high-speed networks.

59
New cards

Principle of Least Privilege

A security concept where users are given the minimum levels of access necessary to perform their tasks.

60
New cards

Zero Trust

A security model that requires verification of every user and device regardless of whether they are inside or outside the network.

61
New cards

Network Perimeter

The boundary of a network, often secured by various defenses to prevent unauthorized access.

62
New cards

Wi-Fi Protected Access (WPA)

A security protocol designed to create secure wireless networks, noted for its versions WPA2 and WPA3.

63
New cards

Heat Map (in Wi-Fi networks)

A visual representation of signal strength and coverage area for wireless networks.

64
New cards

Alien Crosstalk

Interference that occurs between non-adjacent channels in a wireless environment.

65
New cards

Extensible Authentication Protocol (EAP)

An authentication framework used in wireless networks for secure credentials exchange.

66
New cards

RADIUS (Remote Authentication Dial-In User Service)

A networking protocol that provides centralized authentication, authorization, and accounting.

67
New cards

Multifactor Authentication (MFA)

A security system that requires more than one method of verification from independent categories of credentials.

68
New cards

Vulnerability Management

The process of identifying, classifying, remediating, and mitigating vulnerabilities in software and hardware.

69
New cards

Risk Assessment

The process of analyzing and evaluating the risk associated with vulnerabilities to determine the potential impact of a threat.

70
New cards

OpenVAS

An open source vulnerability assessment tool used to scan for and identify vulnerabilities in networked systems.

71
New cards

CVE

Common Vulnerabilities and Exposures, a list of publicly known cybersecurity vulnerabilities.

72
New cards

NVD

National Vulnerability Database, a comprehensive database of vulnerabilities maintained by NIST.

73
New cards

Zero-Day Attack

An exploit that takes advantage of a security vulnerability on the same day that the vulnerability becomes widely known.

74
New cards

SQL Injection

A code injection technique that exploits a vulnerability in an application's software, allowing an attacker to interfere with the queries that an application makes to its database.

75
New cards

Cross Site Scripting (XSS)

A security vulnerability that allows attackers to inject malicious scripts into webpages viewed by other users.

76
New cards

Penetration Testing

An authorized simulated attack on a computer system, performed to evaluate the security of the system.

77
New cards

Misconfiguration

Incorrect or inadequate setup of a system or application that exposes it to potential vulnerabilities.

78
New cards

VCEs

Valuable practice exams that are important for exam preparation.

79
New cards

PBQs

Part B Questions that allow for partial credit if answered partially correct.

80
New cards

Partial credit

Credit awarded for a partially correct answer, contributing towards the final score.

81
New cards

Inline lesson quizzes

Quizzes associated with lessons that are valuable for exam prep but less important than VCEs.

82
New cards

Example exam

A practice exam that can be taken multiple times to aid preparation.

83
New cards

Attack Surface

The total sum of all points (attack vectors) that can be exploited to gain unauthorized access to a system.

84
New cards

Attack Vector

Any method or pathway employed by a threat actor to gain access to a computer system.

85
New cards

Internal Threats

Risks originating within the organization, such as uneducated users or disgruntled employees.

86
New cards

External Threats

Risks posed by outside entities, including cybercriminals and natural events.

87
New cards

CIA Triad

A model for information security, focusing on the principles of Confidentiality, Integrity, and Availability.

88
New cards

Gap Analysis

A method to determine the differences between the current security posture and the desired state.

89
New cards

Traffic Light Protocol

A system used to categorize and prioritize information based on its sensitivity, represented by colors: red, yellow, green.

90
New cards

Access Control

Measures or policies that restrict or allow users to access certain information or functions.

91
New cards

AAA Compliance

Refers to Access Control services that consist of Authentication, Authorization, and Accounting.

92
New cards

IAM Services

Identity and Access Management services that verify and manage user identities and permissions.

93
New cards

Vulnerability Assessment

A process of identifying, quantifying, and prioritizing vulnerabilities in a system.

94
New cards

Threat Intelligence

Information that helps organizations understand their vulnerability to potential threats and risks.

95
New cards

Security Controls Pyramid

A framework representing different layers of security controls: managerial, operational, and technical.

96
New cards

Preventative Controls

Security measures put in place to prevent incidents before they occur.

97
New cards

Detective Controls

Security mechanisms that identify and alert on incidents in progress.

98
New cards

Corrective Controls

Measures implemented to repair or restore systems after an incident has occurred.

99
New cards

Social Engineering

Manipulative techniques used by attackers to deceive individuals into divulging sensitive information.

100
New cards

Phishing

A cyber-attack method where attackers send fraudulent communications that appear to come from a reputable source.