What does SaaS stand for?
Software as a Service
What is an IT audit?
Independent Review
What are the 3 steps in a risk management plan?
Identify, Assess, Control
What does QA stand for in cybersecurity governance?
Quality Assurance
What is malware?
Malicious Software
Which element allows access to cloud services via standard internet protocols?
Broad Network Access
How is auditing different from pen testing?
Broader Evaluation
What is the goal of risk management?
Minimize Risk
What is the main difference between QA and QC?
Process vs Product
What attack tricks users with fake emails?
Phishing
Which cloud model provides a platform for developers to build apps?
Paas
What must be defined during audit planning?
Audit Scope
Which strategy shifts risk to third parties?
Transferal
How is QA applied to IAM in cybersecurity?
Process Validation
What type of attack overwhelms systems with traffic?
DDoS
What Notorious Nine threat involves attackers stealing login credentials?
Account Hijacking
Name a technique used in the testing phase.
Observation
What is a proactive risk management example?
Prevention Measures
Why should Quality teams be separate from Operations?
Unbiased Evaluation
What threat intercepts communications between two parties?
Man-in-the-Middle
Which model is shared by organizations with similar goals or policies?
Community Cloud
What supports compliance during an audit?
Audit Logs
When would termination be appropriate?
Remove Asset
What does the Quality Improvement Model help with?
Process Improvement
What threat disguises malware in online ads?
Malvertising