Confidentiality & Integrity & Availability
Data at rest, transit, process
Policies and Procedures
ISO Cybersecurity Model
Technologies
Education, Awareness, and Training
100

Port scans, vulnerability scans, and penetration tests

What is Availability Testing?

100

Wired Networks

What is a type of Data in Transit?

100

Sets the rules for expected behavior

What is one of the many tasks for accomplishing a security policy?

100

Look at / Monitor open ports on a host or server

What are Network and Port Scanners?

100

Organizations also post banners and signage to increase overall cybersecurity awareness

What do organizations do to increase cybersecurity awareness?

200

The accuracy, consistency, and trustworthiness of data during its entire life cycle

What is Integrity in Cybersecurity?

200

Means that a type of storage device retains the data when no user or process is using it

What is Data at Rest?

200
A suggestion to do things more efficiently and securely

What is a guideline?

200

Content Filtering Services

What is one of the hardware technologies used for safeguarding?

200

A day spent on awareness of cybersecurity

What is a cybersecurity awareness day?

300

Prevents the disclosure of information to unauthorized people, resources, and processes

What is Confidentiality in Cybersecurity?

300

Involves sending information from one device to another

What is Data In Transit?

300

A set of security objectives for a company that includes rules of behavior for users/administrators and specifies system requirements

What is a security policy?

300

Programs and services that protect OS, databases, and other services operating on workstations, portable devices, and server

What is Software in Technology?

300

The creation of cybersecurity orientation workshops and seminars help to increase awareness

What is a way to help security awareness?

400

Backup of organization data, configuration data, and personal data ensures system availability

What is a Backup System?

400

RAID provides improved performance and fault tolerance

What does RAID (Redundant array of independent disks) help with? 

400

An information security standard published in 2005 and revised in 2013

What is ISO/IEC 27000?

400

Contain rules that define the traffic allowed into and out of a network

What is a Firewall?

400

The organization’s environment / The level of threat to cybersecurity

What does an active security awareness program depend on?

500

Information belonging to a government body classified by its level of sensitivity

What is Classified Information?

500

Multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk

What is RAID? (Redundant array of independent disks)

500

The ISO model uses domains instead of layers because each domain has a direct relationship with the other domains

What is the difference between the ISO and OSI models?

500

Software Firewalls, Network and Port Scanners, Protocol/Signature Analyzers, Vulnerability Scanners, Host-Based Intrusion Detection Systems

What are the software-based technology commonly used for safeguarding?

500

Security awareness should be an ongoing process since new threats and techniques are always being developed  

What should security awareness be?

M
e
n
u