cyber security Flashcards

(27 cards)

1
Q

What is cyber security?

A

Cyber security is the practice of protecting computers, networks, and data from theft, damage, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cyber crime?

A

Cyber crime refers to illegal activities conducted through the internet or involving computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: Cyber security only focuses on protecting personal computers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: The primary goal of cyber security is to protect __________.

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a type of cyber crime? A) Hacking B) Phishing C) Identity Theft D) All of the above

A

D) All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

Phishing is a cyber crime that involves tricking individuals into providing personal information through deceptive emails or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the term ‘malware’ refer to?

A

Malware is software specifically designed to disrupt, damage, or gain unauthorized access to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Cyber security measures can only be implemented at the organizational level.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a firewall?

A

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of encryption in cyber security?

A

Encryption is used to protect data by converting it into a code to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: Cyber security involves the protection of __________, networks, and programs from digital attacks.

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of cyber crime involves stealing someone’s personal information to impersonate them?

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Denial of Service (DoS) attack?

A

A DoS attack aims to make a computer or network resource unavailable to its intended users by overwhelming it with traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Strong passwords are an essential part of cyber security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of antivirus software?

A

Antivirus software is designed to detect, prevent, and remove malware from computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does ‘social engineering’ refer to in the context of cyber crime?

A

Social engineering is a manipulation technique that exploits human psychology to gain confidential information.

17
Q

Fill in the blank: Cyber security threats can come from __________, insiders, or external attackers.

A

malicious actors

18
Q

What is the difference between a virus and a worm?

A

A virus attaches itself to a file and spreads when the file is shared, while a worm can replicate itself and spread independently.

19
Q

True or False: Cyber security only involves technology.

20
Q

What is two-factor authentication (2FA)?

A

2FA is a security process in which the user provides two different authentication factors to verify themselves.

21
Q

What is a data breach?

A

A data breach is an incident where unauthorized access is gained to confidential data.

22
Q

Which of the following is a common method of cyber attack? A) SQL Injection B) Password Cracking C) Man-in-the-Middle D) All of the above

A

D) All of the above

23
Q

Fill in the blank: Cyber security policies should be regularly updated to address __________.

24
Q

What is the role of a Chief Information Security Officer (CISO)?

A

The CISO is responsible for overseeing and managing an organization’s information security strategy and programs.

25
True or False: Cyber security awareness training is important for all employees.
True
26
What is ransomware?
Ransomware is a type of malware that encrypts a victim's files and demands payment for the decryption key.
27
What is the primary purpose of penetration testing?
Penetration testing is conducted to identify vulnerabilities in a system by simulating cyber attacks.