Foundations of Cybersecurity Flashcards

Module four

1
Q

What is antivirus software?

A

A software program used to prevent, detect, and eliminate malware and viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a database?

A

An organized collection of information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a data point?

A

A specific piece of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does an intrusion detection system (IDS) do?

A

Monitors system activity and alerts on possible intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Linux?

A

An open-source operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a log?

A

A record of events that occur within an organization’s systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a network protocol analyzer (packet sniffer)?

A

A tool designed to capture and analyze data traffic within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the order of volatility?

A

A sequence outlining the order of data that must be preserved from first to last

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is programming?

A

A process that can be used to create a specific set of instructions for a computer to execute tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is protecting and preserving evidence?

A

The process of properly working with fragile and volatile digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is security information and event management (SIEM)?

A

An application that collects and analyzes log data to monitor critical activities in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SQL (Structured Query Language)?

A

A query language used to create, interact with, and request information from a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which tool is used to capture and analyze data traffic within a network?

A

Network protocol analyzer (packet sniffer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of tool uses dashboards to organize data into categories and allows analysts to identify potential security incidents as they happen?

A

SIEM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can cybersecurity professionals use logs for?

A

To identify vulnerabilities and potential security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: A _____ is a manual that provides details about operational actions.

A

Playbook.

17
Q

What do security professionals use to interact with and request information from a database?

A

SQL.

18
Q

Fill in the blank: Linux is an open-source _____ that can be used to examine logs.

A

Operating system.

19
Q

Fill in the blank: A security team uses a _____ to help them document organizational processes from beginning to end.

A

Playbook.

20
Q

What does programming help with in security tasks?

A

Completing repetitive tasks and processes, creating a specific set of instructions for a computer to execute tasks.

21
Q

What is a key benefit of using Python to perform security tasks?

A

It simplifies repetitive tasks.

22
Q

What is the purpose of encryption in cybersecurity?

A

To make data unreadable and difficult to decode for unauthorized users, ensuring confidentiality.

23
Q

What is penetration testing?

A

Simulated attacks to identify vulnerabilities in systems, networks, websites, applications, and processes.

24
Q

What are SIEM tools used for?

A

Monitoring critical activities, analyzing filtered events and patterns, saving time by reducing the amount of data to be reviewed.

25
Q

Fill in the blank: Linux relies on a _____ as the primary user interface.

A

Command line.