Comptia Security+ Flashcards

(26 cards)

1
Q

Define confidentiality in security.

A

The principle of ensuring that information is not disclosed to unauthorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CIA stand for in cybersecurity?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false: Integrity ensures data remains accurate and unaltered.

A

TRUE

Integrity is crucial for maintaining trust in data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: Availability ensures that information is ______ when needed.

A

accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a firewall?

A

A network security device that monitors and controls incoming and outgoing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define phishing.

A

A cyber attack that attempts to trick individuals into providing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of encryption?

A

To protect data by converting it into a coded format that is unreadable without a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false: Malware includes viruses, worms, and Trojans.

A

TRUE

Malware is designed to harm or exploit any programmable device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: Social engineering exploits ______ to manipulate individuals.

A

human psychology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a DDoS attack?

A

A Distributed Denial of Service attack that overwhelms a target with traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define vulnerability.

A

A weakness in a system that can be exploited by threats to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of antivirus software?

A

To detect, prevent, and remove malware from computers and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: Two-factor authentication increases security by requiring two forms of verification.

A

TRUE

This method significantly reduces the risk of unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: Risk management involves identifying, assessing, and ______ risks.

A

mitigating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a security policy?

A

A formal document that outlines an organization’s security expectations and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define penetration testing.

A

A simulated cyber attack to identify vulnerabilities in a system.

17
Q

What does SIEM stand for?

A

Security Information and Event Management.

18
Q

True or false: SSL is used to secure communications over a computer network.

A

TRUE

SSL encrypts data between a web server and a browser.

19
Q

Fill in the blank: Access control determines who can ______ resources.

A

use or modify

20
Q

What is a security breach?

A

An incident where unauthorized access to data or systems occurs.

21
Q

Define malware.

A

Software designed to disrupt, damage, or gain unauthorized access to systems.

22
Q

What is data loss prevention?

A

Strategies and tools to ensure sensitive data is not lost or misused.

23
Q

True or false: Cloud security is only the responsibility of the service provider.

A

FALSE

Users also share responsibility for securing their data in the cloud.

24
Q

Fill in the blank: Incident response is the approach to managing ______ events.

A

security incidents

25
What is **social engineering**?
Manipulating individuals into divulging confidential information.
26
Define **zero-day exploit**.
A cyber attack that occurs on the same day a vulnerability is discovered.