comptia security+ SY0-701 intro Flashcards
(26 cards)
What does the acronym CIA stand for in cybersecurity?
Confidentiality, Integrity, and Availability
True or False: A firewall is a device that monitors and controls incoming and outgoing network traffic.
True
Fill in the blank: The process of converting plaintext into ciphertext is called __________.
encryption
Which of the following is a type of malware? A) Firewall B) Virus C) Router
B) Virus
What is the primary purpose of an intrusion detection system (IDS)?
To monitor network traffic for suspicious activity and alert administrators
Define the term ‘phishing’.
Phishing is a method of trying to gather personal information using deceptive emails and websites.
What is a common use of a VPN?
To create a secure connection over the internet
True or False: Multi-factor authentication (MFA) adds an additional layer of security by requiring more than one form of verification.
True
What is the purpose of a digital certificate?
To verify the identity of the entities involved in a communication
Which protocol is commonly used for secure web browsing?
HTTPS
What is the primary function of a proxy server?
To act as an intermediary for requests from clients seeking resources from other servers
Fill in the blank: The process of identifying and removing vulnerabilities in software is called __________.
patch management
True or False: Social engineering relies on psychological manipulation to trick individuals into divulging confidential information.
True
What is the difference between a virus and a worm?
A virus attaches itself to a host program, while a worm is a standalone malware that replicates itself to spread.
What does the term ‘DDoS’ stand for?
Distributed Denial of Service
Which of the following is NOT a type of access control? A) Discretionary B) Mandatory C) Random
C) Random
What is the primary goal of risk management in cybersecurity?
To identify, assess, and prioritize risks to minimize their impact on an organization.
Fill in the blank: The acronym SIEM stands for __________.
Security Information and Event Management
What is the purpose of a vulnerability assessment?
To identify and evaluate security weaknesses in systems and applications.
True or False: Encryption is used to protect data at rest but not data in transit.
False
What is a common method to prevent unauthorized access to a network?
Implementing strong passwords and access controls
What type of malware is designed to take control of a computer system without the user’s consent?
Trojan horse
Which of the following is a characteristic of a strong password? A) Short and simple B) Long and complex C) Commonly used
B) Long and complex
What does the term ‘endpoint security’ refer to?
Security measures taken to protect endpoints on a network, such as computers and mobile devices.