Any event that significantly disrupts an organization's operations
Disaster
Patch, policy, protect, port, probe, physical are considered...
The 6 P's
The use of computers and their internet connectivity to launch a terrorist attack
Cyber terrorism
Primary weapon in cyber warfare and terrorism used for malicious harm to a computer/network
Malware
Disruptions in communications can arise from...
Cyber terrorism
A document that defines how an organization deals with certain aspects of security
Security policy
The inner and outer firewall are a part of...
DMZ
A primary weapon in cyber warfare and terrorism used for malicious harm to a computer/network
Malware
A document that defines how an organization deals with certain aspects of security
Security Policy
General guide for testing
NIST800-115
"Never trust, always verify" relates to...
Zero Trust
Tool that routinely checks the network for vulnerabilities and flaws
Common vulnerability scanner
The three different types of cyber attacks include...
Economic, military, and general
Use firewalls and proxy servers, separate web users from rest of network, or use DMZ to secure...
Networks
Which topic can be shown in a pyramid structure
Standards, guidelines, and procedures
HIPPA, Sarbanes-Oxley, and PCI DSS are examples of...
Important laws
Enabling operating systems, logging and backup data regularly to secure
Server
Any attempt to manipulate information in pursuit of a military or political goal
Information warfare
Backup for a server in case of failure
Fault tolerance
HIPPA stands for...
Health Insurance Portability and Accountability Act
Instructions on how to handle an issue
Procedures
What is the US government database?
Security Content Automation Protocol (SCAP)
Vulnerabilities to less secure systems can specifically harm...
Military cyber attacks
Security framework requiring all users to be authenticated, authorized, and continuously validated for security configuration
Zero trust
What are the three types of disaster recovery plans?
Disaster recovery plan, business continuity plan, and impact analysis