What does the acronym CIA stand for in cybersecurity?
Confidentiality, Integrity, Availability
True or False: A firewall is a device that monitors and controls incoming and outgoing network traffic.
True
Fill in the blank: The process of converting plaintext into ciphertext is called __________.
encryption
What type of attack involves overwhelming a system with traffic to make it unavailable?
Denial of Service (DoS) attack
What is the main purpose of a VPN?
To create a secure connection over the internet
Which of the following is a common malware type? A) Virus B) Firewall C) Router
A) Virus
What is social engineering?
Manipulating individuals to divulge confidential information
True or False: Multi-factor authentication requires two or more verification methods.
True
What does the term ‘phishing’ refer to?
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity
Which protocol is commonly used for secure data transmission over the internet?
HTTPS
What is the function of an Intrusion Detection System (IDS)?
To monitor network traffic for suspicious activity
Fill in the blank: A __________ is a software or hardware tool used to filter traffic based on predetermined security rules.
firewall
What does the term ‘zero-day vulnerability’ mean?
A flaw in software that is unknown to the vendor and has no patch available
True or False: Encryption is only necessary for data at rest.
False
What is the primary purpose of an SSL certificate?
To secure data transmitted over the internet
What does DLP stand for in cybersecurity?
Data Loss Prevention
Which of the following is NOT a type of malware? A) Trojan B) Worm C) Router
C) Router
What is the principle of least privilege?
Users should have the minimum level of access necessary to perform their job functions
Fill in the blank: __________ is the practice of regularly updating software to fix vulnerabilities.
Patch management
What is a common method of protecting against unauthorized access to a network?
Using strong passwords and changing them regularly
True or False: A man-in-the-middle attack occurs when an attacker secretly relays and possibly alters communication between two parties.
True
What is the purpose of a security policy?
To establish guidelines for protecting an organization’s assets
What does the acronym SIEM stand for?
Security Information and Event Management