Chapter 10
Chapter 11
Chapter 12
Vocab
Wild Card
100

Any event that significantly disrupts an organization's operations


Disaster

100

Patch, policy, protect, port, probe, physical are considered...

The 6 P's

100

The use of computers and their internet connectivity to launch a terrorist attack

Cyber terrorism

100

Primary weapon in cyber warfare and terrorism used for malicious harm to a computer/network

Malware

100

Disruptions in communications can arise from...

Cyber terrorism

200

A document that defines how an organization deals with certain aspects of security

Security policy

200

The inner and outer firewall are a part of...

DMZ

200

A primary weapon in cyber warfare and terrorism used for malicious harm to a computer/network

Malware

200

A document that defines how an organization deals with certain aspects of security

Security Policy

200

General guide for testing

NIST800-115

300

"Never trust, always verify" relates to...

Zero Trust

300

Tool that routinely checks the network for vulnerabilities and flaws

Common vulnerability scanner

300

The three different types of cyber attacks include...

Economic, military, and general

300

Use firewalls and proxy servers, separate web users from rest of network, or use DMZ to secure...

Networks

300

Which topic can be shown in a pyramid structure

Standards, guidelines, and procedures

400

HIPPA, Sarbanes-Oxley, and PCI DSS are examples of...

Important laws

400

Enabling operating systems, logging and backup data regularly to secure

Server

400

Any attempt to manipulate information in pursuit of a military or political goal

Information warfare

400

Backup for a server in case of failure

Fault tolerance

400

HIPPA stands for...

Health Insurance Portability and Accountability Act

500

Instructions on how to handle an issue

Procedures

500

What is the US government database?

Security Content Automation Protocol (SCAP)

500

Vulnerabilities to less secure systems can specifically harm...

Military cyber attacks

500

Security framework requiring all users to be authenticated, authorized, and continuously validated for security configuration

Zero trust

500

What are the three types of disaster recovery plans?

Disaster recovery plan, business continuity plan, and impact analysis

M
e
n
u