cyber security Flashcards
What is the primary goal of cybersecurity?
To protect systems, networks, and programs from digital attacks.
True or False: Cybersecurity only involves protecting data from unauthorized access.
False
Fill in the blank: Cybersecurity encompasses measures to protect ______, ______, and ______.
information, networks, systems
What is a common type of cyber threat?
Malware
Multiple choice: Which of the following is NOT a type of malware?
Firewall
What does the term ‘phishing’ refer to?
A technique used to trick individuals into revealing sensitive information.
True or False: Firewalls are used to prevent unauthorized access to or from a private network.
True
What is the purpose of encryption in cybersecurity?
To protect data by converting it into a coded format.
Fill in the blank: A ______ attack is designed to overwhelm a system, making it unavailable to users.
Denial-of-Service (DoS)
Multiple choice: Which of the following is a common method to secure passwords?
Using strong, unique passwords and two-factor authentication.
What is the role of an intrusion detection system (IDS)?
To monitor network traffic for suspicious activity.
True or False: Cybersecurity is only the responsibility of IT professionals.
False
What is a ‘zero-day’ exploit?
A vulnerability that is exploited before the vendor releases a patch.
Fill in the blank: Cybersecurity policies should be regularly ______ to adapt to new threats.
updated
Multiple choice: Which of the following is a common security framework?
NIST Cybersecurity Framework
What is the purpose of a security audit?
To assess the effectiveness of an organization’s security measures.
True or False: Antivirus software can completely eliminate all cyber threats.
False
What does ‘social engineering’ refer to in cybersecurity?
Manipulating individuals to gain confidential information.
Fill in the blank: Multi-factor authentication adds an additional layer of ______ to the login process.
security
Multiple choice: Which of the following best describes ransomware?
Malware that encrypts files and demands payment for decryption.
What is the purpose of penetration testing?
To simulate cyberattacks to identify vulnerabilities.
True or False: Cybersecurity threats can come from both external and internal sources.
True
What is the significance of incident response planning?
To prepare for and effectively respond to cybersecurity incidents.
Fill in the blank: The ______ principle states that users should have only the permissions needed to perform their tasks.
least privilege