Security Flashcards

(51 cards)

1
Q

Which law focuses on protecting health information in the United States?

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of creating separate network segments?

A

To isolate sensitive information and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why should you be cautious about participating in social media quizzes and games?

A

They can collect personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can happen if people rely too much on automated security tools?

A

They might miss subtle signs of a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a zero-day attack?

A

An attack that exploits an unknown vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens to your purchased apps if you delete them from your device?

A

You can re-download them without paying again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an example of “Something You Know”?

A

Passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is end-to-end encryption important for instant messaging?

A

It prevents third parties from reading your messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a site license?

A

A license that allows software to be installed on multiple computers for one price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of Indirect PII?

A

Postal code or ZIP code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you use the same password on multiple sites and one site gets hacked, what should you do?

A

Change your password on all sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is targeted advertising?

A

Using your data to show ads for products you might like

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you do if a virus spreads over a network?

A

Disconnect the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a sign of a potentially fake email?

A

The email contains spelling or grammar mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a common protocol for encrypting data in transit?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a primary reason websites want you to accept their cookies?

A

To show you more ads based on your interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the first step to remove an app on Windows?

A

Open Settings and go to Apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What should you do if you change your mind after deleting an app on macOS?

A

Drag the app back from the trash can tp the Application Folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is NOT a privacy issue that is related to using a social networking site?

A

You need to ensure that private information is physically shredded prior to disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who usually owns the data you share on social media platforms?

A

The social media platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why are computers considered high-value targets?

A

They are expensive and store valuable data

22
Q

What is the purpose of creating separate network segments?

A

To isolate sensitive information and systems

23
Q

What does the “Detect” function in the NIST Cybersecurity Framework involve?

A

Monitoring to ensure controls are effective

24
Q

What is real-time scanning in antivirus software?

A

Constantly watching your computer for threats

25
How do you remove an app on Apple's macOS?
Drag and drop the app to the trash can
26
What should you do if you see a warning about an expired certificate on a website?
Check the certificate details and proceed with caution if necessary.
27
What can companies offer if their data gets breached?
Free year of credit monitoring
28
What can happen if people rely too much on automated security tools?
They might miss subtle signs of a security breach
29
What does the "C" in the CIA Triad stand for?
Confidentiality
30
What is a false positive in antivirus software?
When the software detects a virus that isn't actually harmful
31
What happens to your purchased apps if you delete them from your device?
You can re-download them without paying again
32
What is the End User License Agreement (EULA)?
A contract governing the installation and use of software.
33
What is PII?
Personally Identifiable Information
34
What is the current standard for WiFi encryption that is considered very secure?
WPA3
35
Why might your account get flagged when logging in from a different location?
Because logging in from an unfamiliar location looks suspicious.
36
What does "Integrity" in the CIA Triad guarantee?
Information is stored and transferred as intended
37
You receive a text message claiming to be from your phone service provider, warning you about unauthorized activity on your account. The message asks you to click on a link to verify your account details. What should you do?
Call the phone service provider using the number on their official website
38
Why is encrypting data at rest sometimes more complicated than encrypting data in transit?
Because the encryption keys must be kept secure for a longer period of time
39
What should you do if a virus spreads over a network?
Disconnect the network
40
What is an App Store?
A platform where users can search for and download apps
41
What is the main purpose of data privacy rules?
To keep people's private information safe
42
What can companies offer if their data gets breached?
Free year of credit monitoring
43
What is one benefit of a software subscription model?
You always get the latest version and updates.
44
What is a Certificate Authority (CA)?
A company that issues security certificates to websites
45
What is a primary reason websites want you to accept their cookies?
To show you more ads based on your interests
46
What is data integrity?
The idea that data sent over the Internet is accurate when it arrives
47
What is a good practice if you're unsure about a website's trustworthiness?
Look for reviews about the site or product
48
What is the next step after agreeing to the license agreement?
Choose the installation location
49
What should you do if you receive an email that seems to be from a friend but looks suspicious?
Call your friend to verify if they sent it
50
Why might a company choose to encrypt only certain types of data?
To save money and resources
51
What is the purpose of the NIST Cybersecurity Framework?
To develop security policies and capabilities