30 Questions
Which of the following is not a term that is part of the history of cybersecurity?
whizbanger
Which of the following is the best definition of cybersecurity?
The protection of information in all of its forms, wherever it may exist, through the application of good security practices.
Which of the following is not one of the identified good security practices?
cybersecurity programming
What are events or circumstances that have the potential to adversely affect operations and assets?
threats
A person who accesses systems and information without authorization and often illegally is called a(n) _______.
hacker
Which of the following is not one of the three core characteristics of information that give it value?
database
What is the term for a threat that represents a situation where we must rely on technology that cannot be easily replaced?
technological obsolescence
What is the aspect of controlling data access that is NOT one of the four main aspects?
analyze
Who is responsible for storing, maintaining, and protecting information?
data custodians
What type of control is intended to discourage or suppress a possible incident?
deterrent
What type of device regulates the movement of information across networks from the outside world?
firewall
What is a false alarm triggered by an IDPS called?
false positive
What is a software program or hardware appliance that can intercept, copy, and interpret network traffic?
Network protocol analyzer
What is the strategy where an organization decides that an asset is not worth fixing or protecting and removes it?
Acceptance
When a vendor delivers a fix for something that’s not working as it should, it is called a(n) _____.
Patch
Who has primary responsibility for the assessment, management, and implementation of information security in the organization?
Chief Information Security Officer (CISO)
What type of social engineering attack involves emails or phone calls to trick individuals out of information?
Phishing
What is the term for when an adversary steals information and then tries to blackmail the victim into paying for its return?
Information Extortion
What is a senior executive who promotes a project and ensures its support, both financially and administratively, at the highest levels of the organization?
Champion
A good cybersecurity program maintains a careful balance between _____.
Access and Security
What type of threat includes malware such as viruses, worms, and macros, as well as denial of service attacks and script injections?
Software Attacks
What is the term for malicious software elements designed to infect a user’s computer and either steal information or damage the computer?
Viruses and Worms
What is the term for an attack that attempts to overwhelm a computer target’s ability to handle incoming communications?
Denial of Service
What is the term for an attack in which an attacker intercepts a communications stream between two users or systems and inserts himself in the conversation?
A Man-in-the-Middle
What is the term for a situation where technology equipment fails due to various reasons?
technical hardware failure
What is the term for a situation where programming or operating systems fail due to various reasons?
technical software failure
What is the term for a situation where we must rely on technology that cannot be easily replaced?
technological obsolescence
What is the principle of limiting users' access to only the specific information required to perform their assigned jobs?
need-to-know
What is the principle of limiting users' access so that authorized individuals should only have the minimum data access and use rights necessary?
least privilege
Who is/are the individual or group that creates or is responsible for a set of information?
owner
Test your knowledge of cybersecurity basics, including its history, definitions, and concepts. Identify key terms and understand the scope of cybersecurity.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free