Back to notes
Identify two tools or practices used in access control and identity management.
Press to flip
Multi-factor authentication (MFA) and single sign-on are two tools/practices used.
Name one key concern in the sub-domain of cloud security within security architecture/engineering.
One key concern is protecting data stored off-premise, which may include environments like AWS, Azure, or Google Cloud.
Describe a primary focus of application security in cyber security.
Application security focuses on securing software development processes and managing vulnerabilities.
Explain the role of threat intelligence in cyber security.
Threat intelligence involves researching emerging threats and vulnerabilities to better protect information systems.
What dual focus does data protection and forensics cover in cyber security?
Data protection addresses data loss prevention and secure handling, whereas forensics involves data recovery and investigating breaches.
What is the role of security tools specialization in cybersecurity?
It involves maintaining and securing various security tools like EDR, SIEM, and WAF, requiring specialized knowledge.
How do technologies like Kubernetes and Docker contribute to virtualization and containerization security?
They enable resource allocation and create isolated testing environments, improving security.
What does enterprise risk management involve in cybersecurity?
It involves understanding business needs, planning for audits, and ensuring cost-effective protection of assets.
Why is networking considered essential knowledge for security architecture/engineering?
Networking is essential for understanding how the internet works, which is crucial for designing secure environments.
What foundation knowledge is crucial for starting a career in cyber security?
Knowledge in computers, networking, and operating systems is crucial as a foundation.
Differentiate between red teaming and blue teaming in risk assessment and security operations.
Red teaming involves ethical hacking to find vulnerabilities, while blue teaming focuses on defensive measures and incident response.
How are certifications beneficial in starting a cyber security career?
Certifications provide a structured path to acquiring relevant skills and securing a role in cyber security.
What is a primary role of an IoT security specialist in physical security?
An IoT security specialist focuses on protecting physical assets, such as smart appliances and industrial equipment.
Why is understanding frameworks and governance important in cyber security?
It ensures compliance with regulations and standards by creating and updating security frameworks such as NIST and ISO.
What is the significance of cryptography in cyber security architecture/engineering?
Cryptography focuses on securing data through encryption and understanding its vulnerabilities.
Previous
Next