UPDATED Study Guide QUESTIONS
AND CORRECT ANSWERS
What is an event? - CORRECT ANSWERS It can be defined as any
change of state that has significance for the management of a Configuration
Item or IT Service
An anomaly ; a change in standard or baseline network traffic or it service
alert - CORRECT ANSWERS notification of an event taking place
incident - CORRECT ANSWERS an event that has been identified by
the cyber security staff as malicious
vulnerability - CORRECT ANSWERS A flaw or weakness that allows a
threat agent to bypass security.
What is a threat? - CORRECT ANSWERS an act or object or individual
that poses a danger to assets or information system
exploit - CORRECT ANSWERS exploit is a code, process, or act that
takes advantage of a vulnerability or security flaw
risk - CORRECT ANSWERS The likelihood of a threat exploiting a
vulnerability
impact - CORRECT ANSWERS an effect or result of a threat exploiting
a vulnerability
, CIA Triangle - CORRECT ANSWERS Confidentiality, Integrity,
Availability
Confidentiality - CORRECT ANSWERS Ensuring that data is protected
from unauthorized access
Encryption, Access Control, and Strong Authentication
availability - CORRECT ANSWERS Security actions that ensure that
data is accessible to authorized users.
How to protect?
Redundancy
integrity - CORRECT ANSWERS ensuring data has not been tampered
with and comes from the intended source
How to protect?
FILE HASHING, Signatures, asymmetric encryption, Digital Certificates
Encryption - CORRECT ANSWERS Process of converting readable data
into unreadable characters to prevent unauthorized access.
CONFIDENTIALITY