cybersecurity_flashcards_sections_1_to_6

1
Q

What is Cybersecurity?

A

Protecting systems, networks, and data from cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is Cybersecurity important?

A

It prevents data theft, financial loss, and reputational damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are common Cyber Threats?

A

Malware, Phishing, Ransomware, DDoS, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between Ethical and Malicious Hacking?

A

Ethical hacking is legal and for protection; malicious hacking is illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Cybersecurity Laws?

A

Rules that govern cybercrime and ethical hacking practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the OSI & TCP/IP models?

A

Frameworks for understanding how networks operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is IP Addressing and Subnetting?

A

Assigning and dividing IP addresses in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are common network protocols?

A

HTTP, HTTPS, FTP, SSH, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Firewall?

A

A security device that filters incoming/outgoing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are IDS and IPS?

A

Intrusion Detection and Prevention Systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a VPN?

A

A secure, encrypted connection over a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Passive Reconnaissance?

A

Gathering information without interacting with the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Active Reconnaissance?

A

Direct interaction with the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is OSINT?

A

Open-Source Intelligence gathering from public sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is WHOIS Lookup?

A

Retrieving domain ownership details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is DNS Enumeration?

A

Finding DNS records of a domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Google Dorking?

A

Using advanced search operators to find sensitive data.

18
Q

What is Shodan?

A

A search engine for Internet-connected devices.

19
Q

What is Social Engineering?

A

Manipulating people to give up confidential info.

20
Q

What is Network Scanning?

A

Finding live systems and open ports.

21
Q

What is Nmap?

A

A tool to scan ports and services.

22
Q

What is Banner Grabbing?

A

Getting service info from open ports.

23
Q

What is a Vulnerability Scanner?

A

Tool like Nessus or OpenVAS to find system weaknesses.

24
Q

What is SNMP Enumeration?

A

Getting system details via SNMP.

25
What is SMB Enumeration?
Gathering shared file/printer info on Windows systems.
26
What is an Exploit?
Code used to take advantage of a vulnerability.
27
What is Metasploit?
A tool for developing and executing exploits.
28
What is SQL Injection?
Inserting SQL code via input fields to access database.
29
What is XSS?
Injecting malicious scripts into websites.
30
What is CSRF?
Making users perform unwanted actions while logged in.
31
What is Buffer Overflow?
Overwriting memory to execute malicious code.
32
What is Privilege Escalation?
Gaining higher-level access to a system.
33
What is Password Cracking?
Guessing or decrypting passwords.
34
What is Brute Force?
Trying all possible password combinations.
35
What does 'Covering Tracks' mean?
Hiding evidence of the attack.
36
What is a Backdoor?
Secret way to access a system later.
37
What is Persistence?
Maintaining access even after reboot.
38
What is Credential Harvesting?
Collecting passwords and keys.
39
What is Tunneling?
Bypassing network restrictions using hidden paths.
40
What is Pivoting?
Using one system to access another.