Cyber - Sheet1 Flashcards

1
Q

What is the CIA triad in cybersecurity?

A

CIA Triad: Confidentiality ensures data is only accessible by authorized parties. Integrity ensures data is accurate and unaltered. Availability ensures data is accessible when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the difference between symmetric and asymmetric encryption.

A

Symmetric Encryption: Uses the same key for both encryption and decryption. Asymmetric Encryption: Uses a pair of keys (public and private) for encryption and decryption, providing stronger security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a vulnerability and an exploit?

A

Vulnerability: Weakness in a system that could be exploited. Exploit: Code or technique used to take advantage of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the concept of least privilege.

A

Least Privilege: Users should only have the minimum level of access required to perform their job functions, reducing the risk of unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DDoS attack, and how can it be mitigated?

A

DDoS Attack: Overwhelms a target system with a flood of traffic, making it inaccessible to legitimate users. Mitigation involves filtering and blocking malicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a phishing attack, and how can it be prevented?

A

Phishing Attack: Attempts to trick users into divulging sensitive information or clicking on malicious links. Prevention includes user education and email filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the concept of defense in depth.

A

Defense in Depth: Layered approach to security, where multiple security measures are implemented to protect against various threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is malware, and what are some common types?

A

Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system. Common types include viruses, worms, and ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the difference between white-box and black-box testing.

A

White-Box Testing: Tester has full knowledge of the system’s internal workings. Black-Box Testing: Tester has no prior knowledge of the system’s internal structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SSL/TLS, and how does it provide security for internet communication?

A

SSL/TLS: Secure Sockets Layer/Transport Layer Security protocols encrypt data transmitted over the internet, providing secure communication between clients and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the OWASP Top Ten, and why is it important?

A

OWASP Top Ten: List of the most critical web application security risks. Important for developers to prioritize security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you secure a wireless network?

A

Wireless Network Security: Securing Wi-Fi networks involves using strong encryption (e.g., WPA2), disabling SSID broadcasting, and implementing MAC address filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the concept of social engineering and provide examples.

A

Social Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security, often through psychological manipulation or deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a zero-day vulnerability, and how can organizations protect against it?

A

Zero-Day Vulnerability: Vulnerability that is exploited before the vendor releases a patch or fix. Protection involves keeping systems up-to-date and using intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the concept of a security incident response plan.

A

Security Incident Response Plan: Documented procedures outlining how an organization will respond to and manage security incidents, minimizing their impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the difference between a virus, a worm, and a Trojan horse.

A

Virus, Worm, Trojan: Virus attaches to files, Worm spreads independently, Trojan hides in seemingly harmless software.

17
Q

What is a VPN tunneling protocol, and which protocol is commonly used for secure VPN connections?

A

VPN Tunneling Protocol: Establishes secure connection over public network. Common protocol: OpenVPN, IPSec.

18
Q

Explain the concept of a “man-in-the-middle” attack and how it can be mitigated.

A

Man-in-the-Middle Attack: Attacker intercepts communication between two parties. Mitigated by using encryption and digital signatures.

19
Q

What is the difference between vulnerability scanning and penetration testing?

A

Vulnerability Scanning vs Penetration Testing: Scanning identifies weaknesses, Testing actively exploits them.

20
Q

How does a Public Key Infrastructure (PKI) work, and what is its role in cybersecurity?

A

Public Key Infrastructure (PKI): Manages keys and certificates for secure communication.

21
Q

Describe the steps involved in a typical cybersecurity incident response process.

A

Incident Response Process: Prepare, Identify, Contain, Eradicate, Recover, Learn.

22
Q

What are the benefits and risks of using cloud services for storing sensitive data?

A

Cloud Services: Benefits: Scalability, Accessibility. Risks: Data privacy, Security.

23
Q

Explain the concept of a “zero-trust” security model and its implications for network security.

A

Zero-Trust Model: Assumes no trust, verifies everything. Improves network security by limiting access.

24
Q

What is the difference between symmetric and asymmetric key cryptography, and when would you use each?

A

Symmetric vs Asymmetric Key Cryptography: Symmetric uses same key for encryption/decryption, Asymmetric uses key pair (public and private). Symmetric is faster, asymmetric provides better security for key exchange.