Log Data & SIEM
Q: What is the purpose of automated reports in SIEM? A: To generate security reports automatically for analysis.
Q: What is a SIEM dashboard used for? A: To display real-time status information on security events.
Q: What is packet capturing used for? A: To analyze network traffic and identify anomalies.
Security Policies
Q: What are the three main principles of security policies? A: Confidentiality, Integrity, and Availability (CIA).
Q: What is an Acceptable Use Policy (AUP)? A: A document that outlines acceptable use of company assets.
Q: What is a disaster recovery plan (DRP)? A: A plan for restoring IT operations after a disaster.
Incident Response
Q: What are the four phases of the incident response lifecycle? A: Preparation, Detection & Analysis, Containment & Eradication, Post-incident Activity.
Q: What is NIST SP800-61? A: A guide for handling computer security incidents.
Security Standards
Q: What organization publishes security standards like ISO and NIST? A: International Organization for Standardization (ISO) and National Institute of Standards and Technology (NIST).
Q: What are access controls used for? A: To manage user access to data and resources.
Risk Management
Q: What is qualitative risk assessment? A: A subjective analysis of risk based on experience and expert judgment.
Q: What is the formula for Single Loss Expectancy (SLE)? A: SLE = Asset Value (AV) x Exposure Factor (EF).
Q: What is the difference between risk appetite and risk tolerance? A: Risk appetite is the level of risk an organization is willing to accept; risk tolerance is the acceptable variation within that appetite.
Business Impact Analysis
Q: What is Recovery Time Objective (RTO)? A: The maximum time a system can be down before causing serious damage.
Q: What is Recovery Point Objective (RPO)? A: The maximum acceptable amount of data loss measured in time.
Third-Party Risk Management
Q: What is a right-to-audit clause? A: A contract provision allowing security audits of third-party vendors.
Q: What is penetration testing used for? A: Simulating attacks to find vulnerabilities in a system.
Compliance & Privacy
Q: What is the purpose of regulatory compliance? A: To ensure an organization follows laws and industry standards.
Q: What is GDPR? A: The General Data Protection Regulation, an EU law protecting personal data privacy.
Q: What is a non-disclosure agreement (NDA)? A: A legal contract to keep confidential information private.
Audits & Assessments
Q: What is the purpose of cybersecurity audits? A: To evaluate IT security controls and identify weaknesses.
Q: What is the difference between an internal and external audit? A: Internal audits are done by the organization, while external audits are done by third parties.
Security Awareness & Training
Q: What is phishing awareness training? A: Training employees to recognize and avoid phishing attacks.
Q: What is the purpose of user security awareness training? A: To educate employees on cybersecurity risks and best practices.
Q: What is the role of operational security (OPSEC)? A: To protect sensitive data from being exposed to adversaries.
Q: What are some key components of security awareness training? A: Key components include identifying social engineering tactics, understanding password security, and recognizing the importance of reporting suspicious activities.