Study questions group 1 Flashcards

Inprove your understanding on information security (25 cards)

1
Q

What does the acronym CIA stand for in cybersecurity?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A firewall can be both hardware and software.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: The process of converting plaintext into ciphertext is called __________.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a type of malware? A) Virus B) Firewall C) Router D) Switch

A

A) Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary purpose of an Intrusion Detection System (IDS)?

A

To monitor network traffic for suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: Multi-factor authentication requires at least two forms of verification.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does VPN stand for?

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT a common type of attack? A) Phishing B) SQL Injection C) DNS Spoofing D) Debugging

A

D) Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: The principle of __________ ensures that users have the minimum level of access necessary.

A

least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main function of a Digital Certificate?

A

To verify the identity of a user or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Social engineering attacks rely on exploiting human psychology.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the term ‘zero-day vulnerability’ refer to?

A

A security flaw that is exploited before the vendor releases a patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following protocols is used for secure web browsing? A) HTTP B) FTP C) HTTPS D) SNMP

A

C) HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main purpose of a penetration test?

A

To identify security vulnerabilities in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: Antivirus software can completely protect a system from all malware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: __________ is a method of securing a network by segmenting it into multiple zones.

A

Network segmentation

17
Q

Which of the following is an example of a denial-of-service attack? A) DDoS B) Phishing C) Ransomware D) Worm

18
Q

What is the role of a Security Information and Event Management (SIEM) system?

A

To aggregate and analyze security data from multiple sources

19
Q

True or False: Encryption is only necessary for data at rest.

20
Q

Which security framework is widely used to manage cybersecurity risks?

A

NIST Cybersecurity Framework

21
Q

What does the term ‘phishing’ refer to?

A

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity

22
Q

Fill in the blank: A __________ is a document that outlines an organization’s security policies and procedures.

A

security policy

23
Q

What is the purpose of a patch management process?

A

To ensure that software updates are applied regularly to fix vulnerabilities

24
Q

True or False: A strong password should include a mix of letters, numbers, and symbols.

25
Which of the following is a common method to secure wireless networks? A) WEP B) WPA C) FTP D) SNMP
B) WPA