This term describes the potential for loss when a threat exploits a vulnerability.
What is Risk?
This attack floods a system with traffic to make it unavailable to users.
What is a Denial-of-Service (DoS) attack?
This cloud deployment model is owned and operated by a third-party provider and delivers services over the public internet.
What is the Public Cloud model?
A company documents who collected digital evidence, when it was collected, and who handled it afterward to maintain admissibility in court.
What is chain of custody?
Leadership assigns a senior officer to oversee all security operations, risk assessments, and incident response across the enterprise.
What is appointing a Chief Information Security Officer (CISO)?
This security concept ensures data has not been altered without authorization.
What is Integrity?
This type of threat actor is motivated primarily by financial gain.
What is a Cybercriminal?
This architecture assumes no implicit trust and requires continuous verification of every user and device.
What is Zero Trust Architecture?
An administrator configures servers to disable unnecessary services, change default passwords, and apply secure baselines.
What is system hardening?
Employees are given guidance on acceptable and prohibited use of corporate resources to protect assets.
What is an acceptable use policy (AUP)?
This principle limits users to only the permissions necessary to perform their job functions.
What is the Principle of Least Privilege?
This security practice involves regularly scanning systems to identify known weaknesses before attackers exploit them.
What is Vulnerability Scanning?
This resiliency concept refers to spreading workloads across multiple systems to optimize resource use and prevent overload.
What is load balancing?
The process of isolating compromised systems to prevent the threat from spreading is called this.
What is containment?
Quarterly tabletop exercises are conducted to evaluate incident response and business continuity readiness
What are security readiness exercises?
These are divided into administrative, technical, and physical categories.
What are Security Controls?
Separating a network into smaller isolated segments to limit lateral movement is called this.
What is Network Segmentation?
This type of site contains up-to-date copies of systems and data and can take over operations immediately.
What is a hot site?
This framework defines the steps: prepare, identify, contain, eradicate, recover, and lessons learned.
What is the incident response lifecycle?
Policies are periodically reviewed and updated to reflect changes in technology, regulations, and priorities.
What is policy lifecycle management?
This concept ensures a person cannot deny performing an action, often supported by digital signatures.
What is Non-repudiation?
This mitigation technique automatically detects and blocks malicious activity on endpoints like laptops and servers.
What is Endpoint Detection and Response (EDR)?
A cloud provider delivers virtual machines, networking, and storage resources while the customer manages the operating systems and applications.
What is Infrastructure as a Service (IaaS)?
This type of monitoring identifies unusual patterns in network traffic that may indicate a cyberattack.
What is intrusion detection?
The organization tracks PCI-DSS, HIPAA, and ISO compliance to meet regulatory requirements.
What is regulatory compliance auditing?