ss

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/116

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:31 PM on 3/31/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

117 Terms

1
New cards

What is the focus of Security Operations?

Incident response, monitoring, logging, forensics, recovery, continuity, IAM operations, and security processes

2
New cards

What is incident response?

The process of detecting, containing, eradicating, and recovering from security incidents

3
New cards

What is the correct incident response order?

Preparation, detection and analysis, containment, eradication, recovery, lessons learned

4
New cards

What is the purpose of logging?

To record system and security events for monitoring, troubleshooting, and investigations

5
New cards

What is security monitoring?

The ongoing observation of systems and networks to detect suspicious activity

6
New cards

What is a SIEM?

A tool that collects, correlates, and analyzes log data from multiple sources

7
New cards

What is digital forensics?

The collection and analysis of digital evidence after an incident

8
New cards

Why is chain of custody important?

It preserves evidence integrity by documenting who handled it and when

9
New cards

What is business continuity?

The ability to keep essential operations running during a disruption

10
New cards

What is disaster recovery?

The process of restoring systems and data after a major incident

11
New cards

What is the difference between business continuity and disaster recovery?

Business continuity keeps operations running while disaster recovery restores systems

12
New cards

What is IAM?

Identity and Access Management

13
New cards

What is least privilege?

Giving users only the minimum access needed to do their job

14
New cards

What is separation of duties?

Splitting responsibilities so one person does not control an entire critical process

15
New cards

What is account provisioning?

Creating accounts and assigning appropriate access

16
New cards

What is deprovisioning?

Removing access when it is no longer needed

17
New cards

Why are backups important?

They help restore data after ransomware, deletion, corruption, or disasters

18
New cards

What is an incident playbook?

A step-by-step guide for responding to a specific type of security event

19
New cards

What is a tabletop exercise?

A discussion-based practice scenario for incident response

20
New cards

What is an indicator of compromise (IOC)?

Evidence that a system may have been breached

21
New cards

What is an indicator of attack (IOA)?

A sign that malicious activity is currently happening

22
New cards

What is threat hunting?

Proactively searching for hidden threats in systems and networks

23
New cards
24
New cards

What is the focus of Threats, Vulnerabilities, and Mitigations?

Threat actors, malware, social engineering, vulnerabilities, attacks, testing, and mitigation methods

25
New cards

What is a threat actor?

A person or group that carries out malicious activity

26
New cards

What are common threat actor types?

Nation-state, cybercriminal, insider, hacktivist, organized crime, and script kiddie

27
New cards

What is malware?

Malicious software designed to damage, disrupt, or gain unauthorized access

28
New cards

What is ransomware?

Malware that encrypts data and demands payment for decryption

29
New cards

What is a trojan?

Malware disguised as legitimate software

30
New cards

What is a worm?

Malware that self-replicates and spreads across networks

31
New cards

What is a virus?

Malware that attaches itself to a file or program and spreads when executed

32
New cards

What is spyware?

Malware that secretly gathers user or system information

33
New cards

What is social engineering?

Manipulating people into revealing information or performing unsafe actions

34
New cards

What is phishing?

A fraudulent message designed to trick users into giving sensitive information

35
New cards

What is spear phishing?

A targeted phishing attack aimed at a specific person or group

36
New cards

What is whaling?

A phishing attack aimed at high-profile targets like executives

37
New cards

What is vishing?

Phishing carried out through voice calls

38
New cards

What is smishing?

Phishing carried out through text messages

39
New cards

What is shoulder surfing?

Watching someone enter sensitive information

40
New cards

What is tailgating?

Following an authorized person into a restricted area without permission

41
New cards

What is a vulnerability?

A weakness that can be exploited by a threat

42
New cards

What is a zero-day vulnerability?

A flaw that is exploited before a patch or fix is available

43
New cards

What is a patch?

A software update that fixes vulnerabilities or bugs

44
New cards

What is vulnerability scanning?

Automated checking of systems for known weaknesses

45
New cards

What is a false positive in scanning?

A result that incorrectly reports a vulnerability

46
New cards

What is a false negative in scanning?

A result that fails to report a real vulnerability

47
New cards

What is penetration testing?

Authorized simulated attacks to identify security weaknesses

48
New cards

What is mitigation?

Reducing the likelihood or impact of a threat or vulnerability

49
New cards

What is the purpose of user training in mitigation?

To reduce human error and improve awareness of attacks

50
New cards
51
New cards

What is the focus of Security Program Management and Oversight?

Governance, risk, compliance, policies, audits, awareness, vendor risk, privacy, and legal and ethical issues

52
New cards

What is governance?

The system of rules, practices, and processes used to direct and control security efforts

53
New cards

What is risk management?

The process of identifying, assessing, and treating risks

54
New cards

What is risk appetite?

The amount of risk an organization is willing to accept

55
New cards

What is risk tolerance?

The acceptable level of variation around risk objectives

56
New cards

What is compliance?

Following laws, regulations, standards, and internal policies

57
New cards

What is a security policy?

A formal statement of management intent, rules, and expectations

58
New cards

What is a standard?

A mandatory rule that supports a policy

59
New cards

What is a procedure?

A step-by-step set of instructions for performing a task

60
New cards

What is a guideline?

A recommended but optional best practice

61
New cards

What is an audit?

A formal review to verify compliance and control effectiveness

62
New cards

What is security awareness training?

Education that helps users recognize and respond to security risks

63
New cards

What is vendor risk management?

The process of evaluating and monitoring third-party security risks

64
New cards

What is due diligence?

Investigating and assessing a vendor or situation before making a decision

65
New cards

What is due care?

Taking reasonable steps to protect assets and meet responsibilities

66
New cards

What is privacy?

The protection and proper handling of personal and sensitive information

67
New cards

What is data classification?

Labeling data based on sensitivity and handling requirements

68
New cards

What is an acceptable use policy?

Rules for proper use of company systems and resources

69
New cards

What is the purpose of separation of duties in oversight?

To reduce fraud, abuse, and errors by dividing responsibilities

70
New cards

What is the purpose of least privilege in governance?

To limit access and reduce risk exposure

71
New cards
72
New cards

What is the focus of Security Architecture?

Secure design of networks, systems, cloud, endpoints, virtualization, and enterprise infrastructure

73
New cards

What is security architecture?

The design of secure systems and infrastructure based on security principles

74
New cards

What is defense in depth?

Using multiple layers of security controls to protect assets

75
New cards

What is network segmentation?

Dividing a network into smaller parts to improve security and limit movement

76
New cards

What is zero trust?

A security model that assumes no user or device is trusted by default

77
New cards

What is the purpose of a DMZ?

To isolate public-facing services from the internal network

78
New cards

What is a firewall?

A device or software that filters network traffic based on rules

79
New cards

What is an IDS?

An intrusion detection system that alerts on suspicious activity

80
New cards

What is an IPS?

An intrusion prevention system that detects and blocks suspicious activity

81
New cards

What is NAC?

Network Access Control that restricts device access based on security policies

82
New cards

What is secure baseline configuration?

A standardized and hardened system setup

83
New cards

What is hardening?

Reducing attack surface by disabling unnecessary services and tightening settings

84
New cards

What is virtualization?

Running virtual machines on shared physical hardware

85
New cards

What is a virtual machine?

A software-based emulation of a physical computer

86
New cards

What is containerization?

Packaging applications with their dependencies in isolated environments

87
New cards

What is cloud computing?

Delivering computing services over the internet

88
New cards

What is SaaS?

Software as a Service

89
New cards

What is PaaS?

Platform as a Service

90
New cards

What is IaaS?

Infrastructure as a Service

91
New cards

What is elasticity in cloud computing?

The ability to automatically scale resources up or down

92
New cards

What is high availability?

System design that minimizes downtime and keeps services accessible

93
New cards

What is redundancy?

Duplicating critical components to avoid single points of failure

94
New cards

What is an endpoint?

A user device such as a laptop, desktop, or phone connected to the network

95
New cards

What is embedded system security?

Protecting specialized devices with dedicated functions

96
New cards

What is IoT security?

Protecting internet-connected smart devices from misuse and attack

97
New cards
98
New cards

What is the focus of General Security Concepts?

Basic principles, controls, cryptography, resilience, and foundational security ideas

99
New cards

What is the CIA triad?

Confidentiality, Integrity, and Availability

100
New cards

What is confidentiality?

Protecting information from unauthorized access

Explore top notes

note
Learn to Lead Chapter 1 Review
Updated 401d ago
0.0(0)
note
Chapter 19 - Types of Selection
Updated 1310d ago
0.0(0)
note
Chapter 11: Sound
Updated 1043d ago
0.0(0)
note
WW2 1939-1945
Updated 1398d ago
0.0(0)
note
ANATOMY
Updated 1423d ago
0.0(0)
note
Learn to Lead Chapter 1 Review
Updated 401d ago
0.0(0)
note
Chapter 19 - Types of Selection
Updated 1310d ago
0.0(0)
note
Chapter 11: Sound
Updated 1043d ago
0.0(0)
note
WW2 1939-1945
Updated 1398d ago
0.0(0)
note
ANATOMY
Updated 1423d ago
0.0(0)

Explore top flashcards

flashcards
unit 4
126
Updated 1129d ago
0.0(0)
flashcards
ķīmija
21
Updated 1223d ago
0.0(0)
flashcards
engels unit 4: vocabulary
146
Updated 1124d ago
0.0(0)
flashcards
ADHD- Krysiak
42
Updated 279d ago
0.0(0)
flashcards
English Language Paper 1
36
Updated 691d ago
0.0(0)
flashcards
ENGLISH EXAM
101
Updated 810d ago
0.0(0)
flashcards
Spanish 3: Ser Estar Tener
72
Updated 71d ago
0.0(0)
flashcards
Unit 1 Part 1 - Modules 1 - 3
36
Updated 813d ago
0.0(0)
flashcards
unit 4
126
Updated 1129d ago
0.0(0)
flashcards
ķīmija
21
Updated 1223d ago
0.0(0)
flashcards
engels unit 4: vocabulary
146
Updated 1124d ago
0.0(0)
flashcards
ADHD- Krysiak
42
Updated 279d ago
0.0(0)
flashcards
English Language Paper 1
36
Updated 691d ago
0.0(0)
flashcards
ENGLISH EXAM
101
Updated 810d ago
0.0(0)
flashcards
Spanish 3: Ser Estar Tener
72
Updated 71d ago
0.0(0)
flashcards
Unit 1 Part 1 - Modules 1 - 3
36
Updated 813d ago
0.0(0)