Cybersecurity Flashcards

Cybersecurity, malware, etc.

1
Q

What is the practice of protecting systems, networks, and programs from attacks?

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of attack involves hackers demanding money?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the process of converting data into unreadable text?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the standard encryption method used by banks?

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What cybersecurity principle ensures only authorized users can access data?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the process of verifying a user’s identity?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the process of ensuring data remains unchanged?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What cybersecurity measure prevents unauthorized access to a network?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What technique is used to guess passwords by trying many possibilities?

A

Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What method tricks people into giving up personal information?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What security protocol ensures encrypted website communication?

A

TLS (Transport Layer Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the cybersecurity term for an unknown software vulnerability?

A

Zero-Day Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the unauthorized process of gaining access to a system?

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the cybersecurity term for testing security vulnerabilities?

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the cybersecurity term for malicious software?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of malware disguises itself as legitimate software?

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of malware spreads by itself through a network?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of malware records keystrokes?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What attack floods a network with traffic?

A

DDoS (Distributed Denial-of-Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What attack injects malicious code into a website?

A

SQL Injection

21
Q

What is the cybersecurity term for unauthorized modifications to software?

22
Q

What cybersecurity principle restricts user privileges?

A

Least Privilege

23
Q

What software detects and removes malware?

24
Q

What attack involves an attacker sitting between two communicating parties?

A

Man-in-the-Middle (MITM) Attack

25
What is the process of disguising an attacker's true identity?
Spoofing
26
What type of attack involves an attacker impersonating someone else?
Impersonation Attack
27
What is the cybersecurity term for a fake Wi-Fi network designed to steal data?
Evil Twin Attack
28
What protocol is used to securely transfer files?
SFTP (Secure File Transfer Protocol)
29
What protocol is used to send encrypted emails?
PGP (Pretty Good Privacy)
30
What term describes an attacker controlling multiple hacked computers?
Botnet
31
What technique is used to break encrypted data?
Cryptanalysis
32
What cybersecurity attack alters the memory of a running program?
Buffer Overflow Attack
33
What is the secure method to store passwords?
Hashing
34
What method uses multiple authentication factors?
Multi-Factor Authentication (MFA)
35
What security feature in browsers warns of insecure websites?
HSTS (HTTP Strict Transport Security)
36
What security measure replaces real data with fake data?
Data Masking
37
What attack tricks a system into running unauthorized commands?
Command Injection
38
What term refers to unauthorized software hidden in legitimate apps?
Rootkit
39
What principle ensures a user cannot deny actions they performed?
Non-Repudiation
40
What security vulnerability involves injecting scripts into a webpage?
Cross-Site Scripting (XSS)
41
What is the cybersecurity term for unpatched security flaws?
Vulnerabilities
42
What organization provides security standards for web applications?
OWASP (Open Web Application Security Project)
43
What technique is used to check network security for weaknesses?
Vulnerability Scanning
44
What is the cybersecurity term for removing unnecessary software or services?
Hardening
45
What attack forces users to reauthenticate multiple times?
Session Hijacking
46
What is the name of Google’s cybersecurity research team?
Project Zero
47
What law governs data protection in the European Union?
GDPR (General Data Protection Regulation)
48
What organization is responsible for global cybersecurity threat monitoring?
CERT (Computer Emergency Response Team)