comptia security+ SY0-701 intro Flashcards

(26 cards)

1
Q

What does the acronym CIA stand for in cybersecurity?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A firewall is a device that monitors and controls incoming and outgoing network traffic.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: The process of converting plaintext into ciphertext is called __________.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a type of malware? A) Firewall B) Virus C) Router

A

B) Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary purpose of an intrusion detection system (IDS)?

A

To monitor network traffic for suspicious activity and alert administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define the term ‘phishing’.

A

Phishing is a method of trying to gather personal information using deceptive emails and websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a common use of a VPN?

A

To create a secure connection over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Multi-factor authentication (MFA) adds an additional layer of security by requiring more than one form of verification.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a digital certificate?

A

To verify the identity of the entities involved in a communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocol is commonly used for secure web browsing?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary function of a proxy server?

A

To act as an intermediary for requests from clients seeking resources from other servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: The process of identifying and removing vulnerabilities in software is called __________.

A

patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Social engineering relies on psychological manipulation to trick individuals into divulging confidential information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between a virus and a worm?

A

A virus attaches itself to a host program, while a worm is a standalone malware that replicates itself to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the term ‘DDoS’ stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is NOT a type of access control? A) Discretionary B) Mandatory C) Random

17
Q

What is the primary goal of risk management in cybersecurity?

A

To identify, assess, and prioritize risks to minimize their impact on an organization.

18
Q

Fill in the blank: The acronym SIEM stands for __________.

A

Security Information and Event Management

19
Q

What is the purpose of a vulnerability assessment?

A

To identify and evaluate security weaknesses in systems and applications.

20
Q

True or False: Encryption is used to protect data at rest but not data in transit.

21
Q

What is a common method to prevent unauthorized access to a network?

A

Implementing strong passwords and access controls

22
Q

What type of malware is designed to take control of a computer system without the user’s consent?

23
Q

Which of the following is a characteristic of a strong password? A) Short and simple B) Long and complex C) Commonly used

A

B) Long and complex

24
Q

What does the term ‘endpoint security’ refer to?

A

Security measures taken to protect endpoints on a network, such as computers and mobile devices.

25
What is the main function of a security policy?
To outline an organization's approach to protecting its information and assets.
26
Fill in the blank: The acronym MFA stands for __________.
Multi-Factor Authentication