ISC2 Cybersecurity Certification Terms (New 2024/ 2025 Update) Questions and Verified Answers| 100% Correct| A Grade
QUESTION
Egress
... [Show More] Monitoring
Answer:
Monitoring of outgoing network traffic.
QUESTION
Encapsulation
Answer:
Enforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods is the process of encapsulation; its opposite process may be called unpacking, revealing, or using other terms. Also used to refer to taking any set of data and packaging it or hiding it in another data structure, as is common in network protocols and encryption.
QUESTION
Encrypt
Answer:
To protect private information by putting it into a form that can only be read by people who have permission to do so.
QUESTION
Encryption
Answer:
The process and act of converting the message from its plaintext to ciphertext. Sometimes it is also referred to as enciphering. The two terms are sometimes used interchangeably in literature and have similar meanings.
QUESTION
Encryption System
Answer:
The total set of algorithms, processes, hardware, software and procedures that taken together provide an encryption and decryption capability.
QUESTION
Event
Answer:
Any observable occurrence in a network or system. Source: NIST SP 800-61 Rev 2
QUESTION
Exploit
Answer:
A particular attack. It is named this way because these attacks exploit system vulnerabilities.
QUESTION
File Transfer Protocol (FTP)
Answer:
The internet protocol (and program) used to transfer files between hosts.
QUESTION
Firewalls
Answer:
Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.
QUESTION
Fragment Attack
Answer:
In a fragment attack, an attacker fragments traffic in such a way that a system is unable to put data packets back together.
QUESTION
General Data Protection Regulation (GDPR)
Answer:
In 2016, the European Union passed comprehensive legislation that addresses personal privacy, deeming it an individual human right.
QUESTION
Governance
Answer:
The process of how an organization is managed; usually includes all aspects of how decisions are made for that organization, such as policies, roles and procedures the organization uses to make those decisions.
QUESTION
Hardening
Answer:
A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems, and software, including operating system, web server, application server, application, etc. Hardening is normally performed based on industry guidelines and benchmarks, such as those provided by the Center for Internet Security (CIS).
QUESTION
Hardware
Answer:
The physical parts of a computer and related devices.
QUESTION
Hash Function
Answer:
An algorithm that computes a numerical value (called the hash value) on a data file or electronic message that is used to represent that file or message and depends on the entire contents of the file or message. A hash function can be considered to be a fingerprint of the file or message. NIST SP 800-152 [Show Less]