Foundation Flashcards

(22 cards)

1
Q

What is an endpoint in cybersecurity?

A

Any device on a network that sends and receives data, like desktops, laptops, or printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is endpoint security important?

A

Each endpoint represents a potential vulnerability or attack vector that must be secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give examples of common endpoints in a network.

A

Windows desktops, Linux machines, network-based printers, personal laptops, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the goal of studying Windows and Linux OS in cybersecurity?

A

To understand how they work and how to secure them from a cybersecurity perspective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What two environments are covered in endpoint security training?

A

The graphical user interface (GUI) and the command line interface (CLI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some key system functions covered in endpoint security training?

A

Scheduled tasks, running processes, and system logging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Windows method attackers use to maintain access?

A

Scheduled tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Linux method attackers use to maintain access?

A

Cron jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

From a defensive standpoint, what should you look for in logs?

A

Evidence of breaches, rogue processes, or unusual system behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the benefit of learning both offensive and defensive techniques?

A

It helps you understand how threats work and how to prevent, detect, and respond to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is information presented in these labs?

A

In small, bite-sized, consumable pieces that focus on one concept at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What becomes the primary focus when shifting from endpoints to networks in cybersecurity?

A

Communication between endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is network data considered more reliable than endpoint data?

A

It is much harder for adversaries to modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is one benefit of passive network monitoring?

A

It doesn’t impact production systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do network protocols help computers and devices do?

A

Send and receive packets, browse the internet, and support enterprise network operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the ultimate goal of cybersecurity professionals across different roles?

A

To detect, mitigate, or prevent malicious activity

17
Q

Why is it overwhelming to examine all possible network or protocol exploits?

A

There are millions of examples and new methods are constantly being created

18
Q

What is essential for detecting anomalies in network behavior?

A

Knowing what normal protocol behavior looks like and spotting deviations

19
Q

How does protocol knowledge help penetration testers?

A

It allows them to proactively identify vulnerabilities

20
Q

Why is knowledge of network security crucial in cybersecurity?

A

It forms the foundation for success in the field

21
Q

Why are cybersecurity skills not considered static?

A

Because new foundational knowledge continues to emerge as threats evolve