Privileged user management - ANSWER Permits authorized users to maintain and
protect systems and networks. They can modify or circumvent existing safeguards such
as access controls or logging
What are the six control objectives of PCI DSS? - ANSWER 1) build and maintain a
secure network
2) protect card holder data
3) maintain a vulnerability management program
4) implement strong access control measures
5) regularly monitor and test networks
6) maintain an information security policy
Buffer overflow - ANSWER When a program or process tries to store more data in a
buffer (temporary data storage area) than it was intended to hold.
Botnets - ANSWER A large automated and distributed network previously compromised
computers that can be simultaneously controlled to launch large-scale attacks such as
denial of service
What are the three elements of the cyber security role? - ANSWER 1) Governance
2) Risk
3) Compliance
Network Worm - ANSWER A piece of self replicating code designed to spread itself
across computer networks. It does not require intervention for execution to replicate.
Denial of service attack - ANSWER An assault on the service from a single source that
floods it with so many request that it becomes overwhelmed and is either stopped
completely or operates at a significantly reduced rate.
Phishing - ANSWER A type of electronic mail attack that attempts to convince the user
that the originator is genuine, but with the intention of obtaining information for use in
social engineering.
Backdoor - ANSWER A means of regaining access to a compromised system by
installing software or configuring existing software to enable remote access under
attacker defined conditions.
Link File - ANSWER Propagates copies of the worm
Five key functions necessary for the protection of digital assets - ANSWER 1) identify