5. Security Flashcards
What is the difference between a virus and a worm?
A virus requires user interaction to spread, while a worm spreads automatically across networks.
What is the purpose of two-factor authentication (2FA)?
Enhances security by requiring two forms of verification, such as a password and a mobile code.
What is the role of a firewall?
Monitors and controls incoming and outgoing network traffic based on security rules.
What does encryption do?
Converts data into a coded format to protect it from unauthorized access.
What is the principle of least privilege (PoLP)?
A security concept where users are granted the minimum permissions needed to perform their tasks.
What is the purpose of a firewall?
Monitors and controls incoming and outgoing network traffic based on security rules.
What is two-factor authentication (2FA)?
A security method that requires two forms of verification, such as a password and a phone verification code.
What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses one key for encryption and decryption, while asymmetric encryption uses a public and private key pair.
What is the purpose of a VPN (Virtual Private Network)?
Encrypts internet traffic to provide secure communication and anonymity online.
What is a phishing attack?
A type of cyberattack where attackers trick users into providing sensitive information via fraudulent emails or websites.
What is a brute force attack?
A hacking method that tries all possible password combinations to gain unauthorized access.
What is the purpose of antivirus software?
Detects, prevents, and removes malware from a computer or network.
What is social engineering?
A tactic where attackers manipulate individuals into revealing confidential information.
What is the role of encryption in data security?
Protects data by converting it into unreadable formats accessible only with a decryption key.
What is a zero-day vulnerability?
A software flaw unknown to the vendor, often exploited before a fix is available.
What is the difference between a worm and a virus?
A worm spreads independently, while a virus requires a host file to spread.
What is multi-factor authentication (MFA)?
A security system requiring multiple verification methods, such as something you know, have, or are.
What is ransomware?
Malware that locks users out of their data until a ransom is paid.
What is the difference between a public and private key in encryption?
A public key encrypts data, while a private key decrypts it.
What is a man-in-the-middle (MITM) attack?
A cyberattack where an attacker intercepts and alters communication between two parties.
What is a digital certificate?
A certificate issued by a trusted authority to verify the identity of a website or user.
What is the purpose of penetration testing?
Identifies vulnerabilities in a system or network by simulating cyberattacks.
What is a DDoS attack?
A Distributed Denial of Service attack overwhelms a target with traffic, rendering it inaccessible.
What is the purpose of a security policy in an organization?
Defines rules and procedures for maintaining security and protecting assets.
What is the purpose of a hash function in cybersecurity?
Converts data into a fixed-length string, ensuring data integrity by detecting changes.
What is the purpose of a firewall?
Filters network traffic to protect systems from unauthorized access.
What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public and a private key.
What is two-factor authentication (2FA)?
A security process that requires two forms of identification before granting access to a system or service.
What is a VPN (Virtual Private Network)?
A secure, encrypted connection between a device and a network, often used to protect internet traffic.
What is a DDoS (Distributed Denial of Service) attack?
An attack that overwhelms a system with traffic from multiple sources, causing it to become unavailable.
What is a man-in-the-middle (MITM) attack?
An attack where the attacker intercepts communication between two parties without their knowledge.
What is the purpose of an antivirus program?
Detects, prevents, and removes malicious software (malware) from a computer or network.
What is the difference between a virus and a worm?
A virus attaches itself to a program or file, while a worm is a standalone malicious program that spreads across networks.
What is a Trojan horse?
Malicious software disguised as legitimate software that performs harmful actions when executed.
What is the principle of least privilege (PoLP)?
A security principle where users and applications are given the minimum level of access required to perform their tasks.
What is a zero-day vulnerability?
A security flaw that is unknown to the software vendor and can be exploited by attackers.
What is phishing?
A type of social engineering attack where an attacker attempts to trick individuals into revealing sensitive information.
What is multi-factor authentication (MFA)?
A security system that requires multiple forms of authentication (e.g., password, fingerprint, or SMS code).
What is a brute force attack?
An attack that tries every possible password combination until the correct one is found.
What is a dictionary attack?
A type of brute force attack that uses a predefined list of possible passwords.