Cybersecurity Fundamentals Flashcards

1
Q

Q: What is the CIA Triad in cybersecurity?

A

A: Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: What is confidentiality in the CIA Triad?

A

A: Ensuring information is accessible only to authorised individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What is integrity in the CIA Triad?

A

A: Ensuring data is accurate and has not been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What is availability in the CIA Triad?

A

A: Ensuring systems and data are accessible when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q: What is the principle of least privilege?

A

A: Granting users only the minimum access rights they need to perform their tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q: What is a vulnerability?

A

A: A weakness in a system or application that can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q: What is a threat?

A

A: Any potential danger to information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q: What is risk in cybersecurity?

A

A: The potential for loss or damage when a threat exploits a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q: What is malware?

A

A: Malicious software designed to harm or exploit systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q: What are common types of malware?

A

A: Viruses, worms, ransomware, spyware, and Trojans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q: What is a phishing attack?

A

A: An attack where attackers trick users into revealing sensitive information via fake emails or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q: What is a denial-of-service (DoS) attack?

A

A: An attack that overwhelms a system or network, making it unavailable to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q: What is a man-in-the-middle (MITM) attack?

A

A: An attack where the attacker intercepts and alters communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q: What is a brute-force attack?

A

A: An attack that tries multiple password combinations until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q: What is social engineering in cybersecurity?

A

A: Manipulating people into revealing confidential information or performing actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q: What is the Zero Trust model?

A

A: A security model that assumes no user or system is trusted by default, even inside the network.

17
Q

Q: What is Defense in Depth?

A

A: A layered security approach that uses multiple measures to protect data and systems.

18
Q

Q: What is the difference between symmetric and asymmetric encryption?

A

A: Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public and private key pair.

19
Q

Q: What is multi-factor authentication (MFA)?

A

A: A security mechanism requiring two or more verification factors to access a resource.

20
Q

Q: What is a firewall?

A

A: A network security device that monitors and controls incoming and outgoing traffic based on security rules.

21
Q

Q: What is the purpose of patch management?

A

A: Keeping systems up to date with the latest security fixes to reduce vulnerabilities.

22
Q

Q: What is encryption?

A

A: Converting data into an unreadable format to protect it from unauthorised access.

23
Q

Q: What is the purpose of a security policy?

A

A: To define an organisation’s security rules, practices, and procedures.

24
Q

Q: Why is employee training important in cybersecurity?

A

A: To help employees recognise and avoid threats like phishing and social engineering.

25
Q

Q: What is the importance of incident response in cybersecurity?

A

A: To identify, contain, and mitigate security breaches effectively.