CSX Fundamentals Questions and
Answers Rated A+
What is the purpose of a disaster recovery plan in cybersecurity?
To outline the steps to restore systems and data after a cybersecurity incident or other
disaster.
What is a patch management system?
A process of managing, testing, and dep...
CSX Fundamentals Questions and
Answers Rated A+
What is the purpose of a disaster recovery plan in cybersecurity?
✔✔To outline the steps to restore systems and data after a cybersecurity incident or other
disaster.
What is a patch management system?
✔✔A process of managing, testing, and deploying patches to software to address vulnerabilities.
What is an insider threat in cybersecurity?
✔✔A security risk that originates from within an organization, often caused by employees or
contractors with access to sensitive data.
What is an audit trail in cybersecurity?
✔✔A record of system activities and user actions that can be used to track potential security
breaches.
What is data loss prevention (DLP)?
1
,✔✔A strategy to prevent unauthorized access or accidental exposure of sensitive data.
What is ethical hacking?
✔✔The practice of testing and evaluating security by authorized individuals to identify
vulnerabilities in systems.
What is a cybersecurity framework?
✔✔A set of guidelines and best practices used to manage and reduce cybersecurity risks.
What is cloud security?
✔✔The protection of data, applications, and services that are stored or accessed through cloud
computing environments.
What is the primary function of a SIEM (Security Information and Event Management) system?
✔✔To aggregate and analyze security data in real-time to detect and respond to potential threats.
What does a firewall do?
✔✔It monitors and controls incoming and outgoing network traffic based on security rules.
2
, What is the purpose of encryption in cybersecurity?
✔✔To convert data into a format that can only be read with the correct decryption key.
What is multi-factor authentication (MFA)?
✔✔A security measure that requires two or more forms of identification before granting access.
What is a denial-of-service (DoS) attack?
✔✔An attack that floods a network or system with traffic, making it unavailable to users.
What is a Trojan horse in cybersecurity?
✔✔A malicious program disguised as legitimate software to deceive users into installing it.
What does “phishing” refer to in cybersecurity?
✔✔A social engineering attack where attackers deceive individuals into providing sensitive
information via email or websites.
What is the principle of least privilege?
3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ExcellentScores. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.