C836 Fundamentals of Information security | Latest Update | 2024/2025 | 100% Correct
5 views 0 purchase
Course
C836 Fundamentals of Information security |
Institution
C836 Fundamentals Of Information Security |
C836 Fundamentals of Information
security | Latest Update | 2024/2025 |
100% Correct
What is a honeypot?
A honeypot is a security resource that appears to be a legitimate target for cyber attacks but
is actually a decoy used to detect and analyze malicious activity.
What is compliance ...
C836 Fundamentals of Information
security | Latest Update | 2024/2025 |
100% Correct
What is a honeypot?
✔✔ A honeypot is a security resource that appears to be a legitimate target for cyber attacks but
is actually a decoy used to detect and analyze malicious activity.
What is compliance in information security?
✔✔ Compliance refers to the adherence to laws, regulations, and standards that govern
information security practices within an organization.
What is an intrusion detection system (IDS)?
✔✔ An intrusion detection system (IDS) monitors network traffic for suspicious activities and
alerts administrators of potential security breaches.
What is the role of a security architect?
✔✔ A security architect is responsible for designing and implementing security solutions and
architectures to protect an organization’s information assets.
1
,What is data integrity?
✔✔ Data integrity refers to the accuracy and consistency of data over its lifecycle, ensuring that
it remains reliable and unaltered during storage and transmission.
What is the shared responsibility model in cloud security?
✔✔ The shared responsibility model outlines the division of security responsibilities between
cloud service providers and customers, ensuring that both parties understand their roles in
protecting data.
What is information security?
✔✔ Information security is the practice of protecting information from unauthorized access, use,
disclosure, disruption, modification, or destruction.
What does confidentiality mean in the context of information security?
✔✔ Confidentiality refers to the principle of ensuring that sensitive information is accessed only
by authorized individuals and remains protected from unauthorized disclosure.
What is integrity in information security?
2
,✔✔ Integrity ensures that information is accurate, complete, and reliable, and has not been
tampered with or altered by unauthorized parties.
What does availability mean in information security?
✔✔ Availability ensures that information and resources are accessible to authorized users when
needed, minimizing downtime and disruptions.
What is a security incident?
✔✔ A security incident is any event that indicates a potential breach of security or an actual
compromise of information, requiring investigation and response.
What is a security breach?
✔✔ A security breach occurs when unauthorized access to data or systems is achieved, resulting
in the exposure or theft of sensitive information.
What is an information security policy?
✔✔ An information security policy is a formal document that outlines an organization’s
approach to protecting its information assets, including roles, responsibilities, and security
measures.
3
, What is a risk assessment?
✔✔ A risk assessment is a systematic process of identifying, evaluating, and prioritizing risks to
an organization’s information assets and determining appropriate mitigation strategies.
What does the term 'access control' refer to?
✔✔ Access control refers to the mechanisms and policies that determine who can access
information and resources within an organization and under what conditions.
What is a firewall?
✔✔ A firewall is a network security device that monitors and controls incoming and outgoing
traffic based on predefined security rules to protect against unauthorized access.
What is multi-factor authentication (MFA)?
✔✔ Multi-factor authentication (MFA) is a security measure that requires users to provide two
or more forms of verification before granting access to a system or application.
What is social engineering?
4
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SterlingScores. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.08. You're not tied to anything after your purchase.