cyber security Flashcards

1
Q

What is the primary goal of cybersecurity?

A

To protect systems, networks, and programs from digital attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Cybersecurity only involves protecting data from unauthorized access.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: Cybersecurity encompasses measures to protect ______, ______, and ______.

A

information, networks, systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a common type of cyber threat?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multiple choice: Which of the following is NOT a type of malware?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the term ‘phishing’ refer to?

A

A technique used to trick individuals into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Firewalls are used to prevent unauthorized access to or from a private network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of encryption in cybersecurity?

A

To protect data by converting it into a coded format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: A ______ attack is designed to overwhelm a system, making it unavailable to users.

A

Denial-of-Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multiple choice: Which of the following is a common method to secure passwords?

A

Using strong, unique passwords and two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of an intrusion detection system (IDS)?

A

To monitor network traffic for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Cybersecurity is only the responsibility of IT professionals.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a ‘zero-day’ exploit?

A

A vulnerability that is exploited before the vendor releases a patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: Cybersecurity policies should be regularly ______ to adapt to new threats.

A

updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiple choice: Which of the following is a common security framework?

A

NIST Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a security audit?

A

To assess the effectiveness of an organization’s security measures.

17
Q

True or False: Antivirus software can completely eliminate all cyber threats.

18
Q

What does ‘social engineering’ refer to in cybersecurity?

A

Manipulating individuals to gain confidential information.

19
Q

Fill in the blank: Multi-factor authentication adds an additional layer of ______ to the login process.

20
Q

Multiple choice: Which of the following best describes ransomware?

A

Malware that encrypts files and demands payment for decryption.

21
Q

What is the purpose of penetration testing?

A

To simulate cyberattacks to identify vulnerabilities.

22
Q

True or False: Cybersecurity threats can come from both external and internal sources.

23
Q

What is the significance of incident response planning?

A

To prepare for and effectively respond to cybersecurity incidents.

24
Q

Fill in the blank: The ______ principle states that users should have only the permissions needed to perform their tasks.

A

least privilege

25
Multiple choice: Which of the following is a method for securing wireless networks?
Using WPA3 encryption
26
What does GDPR stand for?
General Data Protection Regulation
27
True or False: Cybersecurity is a one-time effort and does not require ongoing attention.
False