Cybersecurity Roles and Concepts Quiz
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What best describes an attack vector?

  • A specific path by which a threat actor gains unauthorized access to a system (correct)
  • A report detailing the findings of a security assessment
  • A type of hardware used in cybersecurity efforts
  • A method for securing a network against intrusions

Which of the following is NOT a type of attack vector?

  • Cyber
  • Environmental (correct)
  • Physical
  • Human

What does the term 'likelihood' refer to in the context of threat assessment?

  • The chance of a threat being realized, usually expressed as a percentage (correct)
  • The frequency of vulnerabilities being exploited
  • The time it takes to respond to a security incident
  • The total cost incurred from a security breach

What is the primary goal of threat hunting in cybersecurity?

<p>To detect presence of threats that haven’t been discovered by regular monitoring (D)</p> Signup and view all the answers

How is 'impact' defined in a threat assessment scenario?

<p>The measurement of damage costs, usually expressed in dollars (B)</p> Signup and view all the answers

What is the primary responsibility of a Cybersecurity Manager/Administrator?

<p>Managing network operations and infrastructure (B)</p> Signup and view all the answers

Which role is primarily concerned with the creation of tools and techniques for cybersecurity?

<p>Cybersecurity Engineer (C)</p> Signup and view all the answers

Who is responsible for directing the overall cybersecurity strategy of an organization?

<p>Chief Information Security Officer (A)</p> Signup and view all the answers

What distinguishes a Cybersecurity Engineer from a Cybersecurity Manager?

<p>The Engineer focuses on system design, while the Manager oversees operations. (A)</p> Signup and view all the answers

Which of the following roles likely has the highest level of responsibility in an organization?

<p>Chief Information Security Officer (C)</p> Signup and view all the answers

What should you do if you believe you’ve completed everything but still do not see a 100% completion rate?

<p>Email <a href="mailto:[email protected]">[email protected]</a> (B)</p> Signup and view all the answers

What is the result of receiving a course completion letter?

<p>You qualify for the 60-Day 100% Pass Guarantee (C)</p> Signup and view all the answers

Who is responsible for the hands-on configuration of a system in cybersecurity?

<p>Cybersecurity Specialist / Technician (B)</p> Signup and view all the answers

How can learners ask questions regarding the course or concepts they do not understand?

<p>Email <a href="mailto:[email protected]">[email protected]</a> (B)</p> Signup and view all the answers

Which of the following statements is true regarding the 60-Day 100% Pass Guarantee?

<p>It is contingent upon receiving a completion letter (C)</p> Signup and view all the answers

Which role primarily involves direct action in configuring cybersecurity systems?

<p>Cybersecurity Specialist / Technician (A)</p> Signup and view all the answers

What action should be taken if a concept within the course is unclear?

<p>Email <a href="mailto:[email protected]">[email protected]</a> for assistance (C)</p> Signup and view all the answers

What type of company is Dion Training Solutions in relation to CompTIA?

<p>A Platinum Delivery Partner (C)</p> Signup and view all the answers

Which of the following describes a preventative control?

<p>It eliminates or reduces the likelihood that an attack can succeed. (C)</p> Signup and view all the answers

What is the main purpose of a detective control?

<p>To identify and record any attempted or successful intrusion. (D)</p> Signup and view all the answers

Which statement about corrective controls is correct?

<p>They act to address impacts after an intrusion event has occurred. (C)</p> Signup and view all the answers

What does the efficiency of a security control measure?

<p>The duration it delays an attack from succeeding. (C)</p> Signup and view all the answers

Which of the following is NOT a function of a preventative control?

<p>Eliminate all intrusion attempts. (C)</p> Signup and view all the answers

Which type of control focuses on access denial?

<p>Preventative Control (C)</p> Signup and view all the answers

What role do physical controls play in security?

<p>They prevent intrusion by physical barriers. (D)</p> Signup and view all the answers

Which of the following is an example of a corrective control?

<p>Incident response plan after a data breach. (B)</p> Signup and view all the answers

What is a primary purpose of Open-Source Intelligence (OSINT)?

<p>To develop strategies for compromising a target (B)</p> Signup and view all the answers

Which of the following could be considered a source of OSINT?

<p>Publicly available information (D)</p> Signup and view all the answers

Which of these is NOT a potential method for gathering OSINT?

<p>Accessing government classified documents (B)</p> Signup and view all the answers

In the context of OSINT, what type of information can be gathered from dating sites?

<p>User preferences and profiles (A)</p> Signup and view all the answers

Which technique can be used to aggregate OSINT effectively?

<p>Using search engines and data mining tools (D)</p> Signup and view all the answers

What is the purpose of Structured Threat Information eXpression (STIX)?

<p>To standardize terminology for indicators of compromise (IoCs) (C)</p> Signup and view all the answers

In what format is STIX expressed?

<p>JavaScript Object Notation (JSON) (D)</p> Signup and view all the answers

Which of the following is NOT a high-level STIX domain object (SDO)?

<p>Malware Types (B)</p> Signup and view all the answers

Which version of STIX does the exam focus on?

<p>STIX v2 (D)</p> Signup and view all the answers

What are attribute-value pairs used for in STIX?

<p>To express structured information about IoCs (B)</p> Signup and view all the answers

Which of the following best describes the relationship features of STIX?

<p>It includes ways of indicating relationships between IoCs. (D)</p> Signup and view all the answers

Which of the following attributes can be found in a high-level STIX domain object?

<p>Threat Actor Name (B)</p> Signup and view all the answers

What aspect of STIX is emphasized in the exam preparation?

<p>Familiarity with STIX v2 (A)</p> Signup and view all the answers

Flashcards

Cybersecurity Specialist/Technician

A cybersecurity professional who configures systems and performs tasks under the direction of a cybersecurity manager.

Vulnerability Response

A role responsible for identifying and responding to vulnerabilities within a system.

Vulnerability Management

The process of managing and controlling the identified vulnerabilities within a system or network.

Vulnerability Handling

A core function related to vulnerability response, where vulnerabilities are processed and dealt with.

Signup and view all the flashcards

Vulnerability Remediation

The steps taken to fix or mitigate a vulnerability in a system.

Signup and view all the flashcards

60-Day 100% Pass Guarantee

A guarantee offered by Dion Training that assures you'll pass your CompTIA exam within 60 days of receiving the course completion letter by providing additional support if you don't succeed on the first attempt.

Signup and view all the flashcards

Core Cybersecurity Roles

The role of the cybersecurity specialist/technician involves configuring and managing systems under the direction of a cybersecurity manager.

Signup and view all the flashcards

The communication channel used to reach Dion Training's support team for assistance or enquiries related to the course content.

Signup and view all the flashcards

Cybersecurity Manager/Administrator

The individual responsible for monitoring and managing the entire network and its infrastructure.

Signup and view all the flashcards

Cybersecurity Engineer

This professional focuses on building tools and designs large-scale security systems for the organization.

Signup and view all the flashcards

Chief Information Security Officer (CISO)

This high-level executive is responsible for the overall cyber and information security strategy of the organization.

Signup and view all the flashcards

Attack Vector

The route (path) a hacker uses to gain unauthorized access to a system.

Signup and view all the flashcards

Types of Attack Vectors

Cyber, Human, and Physical. Different pathways used to exploit vulnerabilities.

Signup and view all the flashcards

Likelihood (Security)

The chance (probability) of a threat becoming a real security incident.

Signup and view all the flashcards

Impact (Security)

The financial or operational cost incurred after a successful attack.

Signup and view all the flashcards

Threat Hunting

A proactive cybersecurity technique used to discover hidden threats that traditional monitoring missed.

Signup and view all the flashcards

Preventative Control

A security control that aims to stop an attack before it can be successful.

Signup and view all the flashcards

Detective Control

A security control that detects an attack that has already happened or is happening.

Signup and view all the flashcards

Corrective Control

A security control that fixes the damage caused by a successful attack.

Signup and view all the flashcards

Physical Control

A security control that physically restricts access to systems or data.

Signup and view all the flashcards

Security Control Efficiency

The ability of a security control to delay an attacker for a long period of time.

Signup and view all the flashcards

NIST SP 800-53

A comprehensive set of security guidelines developed by NIST that details security controls for various systems.

Signup and view all the flashcards

Family Designations in NIST SP 800-53

Categorizations within NIST SP 800- 53 that group related security controls.

Signup and view all the flashcards

Familiarity with NIST SP 800-53 Concepts

Understanding the core concepts within NIST SP 800-53, even if you don't memorize every detail.

Signup and view all the flashcards

Open-Source Intelligence (OSINT)

The practice of gathering information publicly available through sources like websites, social media, and publicly accessible databases.

Signup and view all the flashcards

How OSINT assists attackers

OSINT allows attackers to gather vital information about a target, including their online presence, personal details, and potentially security weaknesses., enabling them to plan and execute targeted attacks.

Signup and view all the flashcards

Publicly Available Information

Publicly available information is information that is readily accessible to anyone, including social media profiles, website content, public records, news articles, and more.

Signup and view all the flashcards

OSINT from Social Media

Social media platforms like Facebook, Twitter, and Instagram offer a treasure trove of information about individuals and organizations. Attackers can use this information to learn about their targets' habits, interests, and relationships, potentially identifying vulnerabilities.

Signup and view all the flashcards

Metadata in OSINT

Metadata is hidden data embedded within files, revealing information such as creation date, author, and even location. This can give attackers valuable insights into a target's activities and potential system vulnerabilities.

Signup and view all the flashcards

STIX (Structured Threat Information eXpression)

A standard terminology for Indicators of Compromise (IoCs) and their relationships, used in the OASIS Cyber Threat Intelligence (CTI) framework.

Signup and view all the flashcards

STIX format

STIX is represented in JSON format, which uses key-value pairs (attribute: value) to define information about cyber threats.

Signup and view all the flashcards

STIX Domain Objects (SDO)

STIX is built upon high-level objects called STIX Domain Objects (SDO) that contain multiple attributes and values. These objects provide a structured way to represent various aspects of cyber threats.

Signup and view all the flashcards

STIX Observed Data

One of the SDOs used in STIX, Observed Data represents observed activities and events related to cyber threats.

Signup and view all the flashcards

STIX Indicator

An SDO in STIX used to represent a specific pattern or indicator that can be used to identify a cyber threat.

Signup and view all the flashcards

STIX Attack Pattern

An SDO that describes the tactics, techniques, and procedures used by attackers in a specific attack.

Signup and view all the flashcards

STIX Campaign and Threat Actors

An SDO in STIX that provides information about organized cyber campaigns and the actors involved.

Signup and view all the flashcards

STIX Course of Action (COA)

An SDO in STIX that represents a recommended course of action to mitigate or respond to a cyber threat.

Signup and view all the flashcards

More Like This

Discover Cybersecurity Job Roles
13 questions

Discover Cybersecurity Job Roles

RevolutionaryMossAgate avatar
RevolutionaryMossAgate
Cybersecurity Team Roles Quiz
4 questions
IT1914 Cybersecurity Role Exercise
7 questions
Use Quizgecko on...
Browser
Browser