Sec+ Flashcards

(45 cards)

1
Q

What does the acronym CIA stand for in information security?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A firewall can prevent all types of cyber attacks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: _______ is the process of converting plaintext into ciphertext.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack involves overwhelming a system with traffic?

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which protocol is commonly used for secure data transmission?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary purpose of an Intrusion Detection System (IDS)?

A

To monitor network traffic for suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Multi-factor authentication requires two or more verification methods.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the term for a security breach that involves unauthorized access to data?

A

Data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a common method for securing wireless networks? (a) WEP (b) WPA2 (c) Both

A

b) WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term ‘phishing’ refer to?

A

A method of tricking individuals into providing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: _______ is a type of malware that can replicate itself.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary function of a VPN?

A

To create a secure connection over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Social engineering attacks rely on technical vulnerabilities.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric uses the same key for encryption and decryption, while asymmetric uses a pair of keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an example of a strong password? (a) 123456 (b) Password (c) P@ssw0rd123!

A

c) P@ssw0rd123!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a common use for a digital certificate?

A

To verify the identity of a website or user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: A _______ is a software application designed to detect and remove malware.

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the term ‘zero-day exploit’ mean?

A

An attack that occurs on the same day a vulnerability is discovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Regular software updates can help protect against security vulnerabilities.

20
Q

What is the purpose of a security policy?

A

To define the rules and procedures for maintaining security within an organization

21
Q

What type of malware is designed to hold a user’s data hostage?

22
Q

Which of the following is a risk associated with using public Wi-Fi? (a) Data interception (b) Enhanced performance (c) Secure connections

A

a) Data interception

23
Q

What is an example of a physical security control?

A

Security cameras

24
Q

Fill in the blank: _______ is the practice of assessing a system for vulnerabilities.

A

Penetration testing

25
What is the purpose of access control?
To restrict access to sensitive information and systems
26
True or False: Encryption can help protect data at rest.
True
27
What does the principle of least privilege entail?
Users should have only the access necessary to perform their job functions
28
What is a common characteristic of a worm?
It can replicate itself and spread independently
29
Fill in the blank: A _______ is a malicious software that disguises itself as a legitimate program.
Trojan horse
30
What is the role of a security audit?
To evaluate the effectiveness of an organization's security measures
31
Which of the following is NOT a type of malware? (a) Trojan (b) Worm (c) Firewall
c) Firewall
32
What does the term 'social engineering' refer to?
Manipulating people into divulging confidential information
33
True or False: Strong passwords should include a mix of letters, numbers, and symbols.
True
34
What is a DDoS attack?
A Distributed Denial of Service attack that uses multiple systems to overwhelm a target
35
Fill in the blank: _______ is the process of verifying the identity of a user or system.
Authentication
36
What does the term 'malware' encompass?
All types of malicious software
37
Which of the following is a method of physical security? (a) Passwords (b) Biometric scanners (c) Firewalls
b) Biometric scanners
38
What is the purpose of a security incident response plan?
To outline the steps to take in response to a security breach
39
True or False: Virtual Private Networks (VPNs) encrypt internet traffic.
True
40
What is a common method for securing email communications?
Using encryption
41
Fill in the blank: The _______ is a framework for managing and mitigating IT risks.
Risk management process
42
What is the primary goal of a cybersecurity framework?
To provide a structured approach to managing cybersecurity risks
43
Which of the following is a type of security control? (a) Preventive (b) Detective (c) Corrective (d) All of the above
d) All of the above
44
What does 'data loss prevention' (DLP) refer to?
Strategies to prevent sensitive data from being accessed or transmitted unauthorized
45
True or False: Security patches should be applied as soon as they are available.
True