Security+ Unit 5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards
What is the purpose of automated reports in SIEM?
To generate security reports automatically for analysis.
2
New cards
What is a SIEM dashboard used for?
To display real-time status information on security events.
3
New cards
What is packet capturing used for?
To analyze network traffic and identify anomalies.
4
New cards
What are the three main principles of security policies?
Confidentiality, Integrity, and Availability (CIA).
5
New cards
What is an Acceptable Use Policy (AUP)?
A document that outlines acceptable use of company assets.
6
New cards
What is a disaster recovery plan (DRP)?
A plan for restoring IT operations after a disaster.
7
New cards
What are the four phases of the incident response lifecycle?
Preparation, Detection & Analysis, Containment & Eradication, Post-incident Activity.
8
New cards
What is NIST SP800-61?
A guide for handling computer security incidents.
9
New cards
What organization publishes security standards like ISO and NIST?
International Organization for Standardization (ISO) and National Institute of Standards and Technology (NIST).
10
New cards
What are access controls used for?
To manage user access to data and resources.
11
New cards
What is qualitative risk assessment?
A subjective analysis of risk based on experience and expert judgment.
12
New cards
What is the formula for Single Loss Expectancy (SLE)?
SLE = Asset Value (AV) x Exposure Factor (EF).
13
New cards
What is the difference between risk appetite and risk tolerance?
Risk appetite is the level of risk an organization is willing to accept; risk tolerance is the acceptable variation within that appetite.
14
New cards
What is Recovery Time Objective (RTO)?
The maximum time a system can be down before causing serious damage.
15
New cards
What is Recovery Point Objective (RPO)?
The maximum acceptable amount of data loss measured in time.
16
New cards
What is a right-to-audit clause?
A contract provision allowing security audits of third-party vendors.
17
New cards
What is penetration testing used for?
Simulating attacks to find vulnerabilities in a system.
18
New cards
What is the purpose of regulatory compliance?
To ensure an organization follows laws and industry standards.
19
New cards
What is GDPR?
The General Data Protection Regulation, an EU law protecting personal data privacy.
20
New cards
What is a non-disclosure agreement (NDA)?
A legal contract to keep confidential information private.
21
New cards
What is the purpose of cybersecurity audits?
To evaluate IT security controls and identify weaknesses.
22
New cards
What is the difference between an internal and external audit?
Internal audits are done by the organization, while external audits are done by third parties.
23
New cards
What is phishing awareness training?
Training employees to recognize and avoid phishing attacks.
24
New cards
What is the purpose of user security awareness training?
To educate employees on cybersecurity risks and best practices.
25
New cards
What is the role of operational security (OPSEC)?
To protect sensitive data from being exposed to adversaries.
26
New cards
What are some key components of security awareness training?
Key components include identifying social engineering tactics, understanding password security, and recognizing the importance of reporting suspicious activities.