Foundations of Cybersecurity Flashcards
Module four
What is antivirus software?
A software program used to prevent, detect, and eliminate malware and viruses.
What is a database?
An organized collection of information or data
What is a data point?
A specific piece of information.
What does an intrusion detection system (IDS) do?
Monitors system activity and alerts on possible intrusions.
What is Linux?
An open-source operating system.
What is a log?
A record of events that occur within an organization’s systems.
What is a network protocol analyzer (packet sniffer)?
A tool designed to capture and analyze data traffic within a network.
What is the order of volatility?
A sequence outlining the order of data that must be preserved from first to last
What is programming?
A process that can be used to create a specific set of instructions for a computer to execute tasks.
What is protecting and preserving evidence?
The process of properly working with fragile and volatile digital evidence
What is security information and event management (SIEM)?
An application that collects and analyzes log data to monitor critical activities in an organization.
What is SQL (Structured Query Language)?
A query language used to create, interact with, and request information from a database.
Which tool is used to capture and analyze data traffic within a network?
Network protocol analyzer (packet sniffer).
What type of tool uses dashboards to organize data into categories and allows analysts to identify potential security incidents as they happen?
SIEM.
What can cybersecurity professionals use logs for?
To identify vulnerabilities and potential security breaches.
Fill in the blank: A _____ is a manual that provides details about operational actions.
Playbook.
What do security professionals use to interact with and request information from a database?
SQL.
Fill in the blank: Linux is an open-source _____ that can be used to examine logs.
Operating system.
Fill in the blank: A security team uses a _____ to help them document organizational processes from beginning to end.
Playbook.
What does programming help with in security tasks?
Completing repetitive tasks and processes, creating a specific set of instructions for a computer to execute tasks.
What is a key benefit of using Python to perform security tasks?
It simplifies repetitive tasks.
What is the purpose of encryption in cybersecurity?
To make data unreadable and difficult to decode for unauthorized users, ensuring confidentiality.
What is penetration testing?
Simulated attacks to identify vulnerabilities in systems, networks, websites, applications, and processes.
What are SIEM tools used for?
Monitoring critical activities, analyzing filtered events and patterns, saving time by reducing the amount of data to be reviewed.
Fill in the blank: Linux relies on a _____ as the primary user interface.
Command line.