Introduction into Cybersecurity Flashcards

CIA Triad, Phishing, Governance Week 1

1
Q

What are the three principles of the CIA Triad?

A
  1. Confidentiality: Ensuring information is accessible only to authorized users.
  2. Integrity: Ensuring data is accurate and unaltered.
  3. Availability: Ensuring information and systems are accessible when needed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Phishing in cybersecurity?

A

Phishing is a cyberattack where attackers impersonate legitimate entities to deceive victims into revealing sensitive information, like passwords or credit card details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Governance mean in GRC?

A

Governance is the framework of policies and practices that guide an organization’s decision-making, ensuring alignment with business goals, ethical behavior, and transparency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Risk Management in GRC?

A

Risk Management is identifying, assessing, and mitigating risks (financial, operational, etc.) to minimize negative impacts on an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Compliance in GRC?

A

Compliance involves adhering to external laws and regulations, as well as internal policies, to avoid legal penalties and maintain trust with stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is Phishing considered a dangerous activity?

A

It tricks users into revealing sensitive information like passwords and financial data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is phishing?

A

Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Phishing attacks can occur via email, social media, and text messages.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: Phishing often uses ________ to trick users into providing personal information.

A

deceptive messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary goal of a phishing attack?

A

The primary goal is to steal sensitive information such as usernames, passwords, and credit card details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multiple choice: Which of the following is NOT a common type of phishing? A) Spear phishing B) Whaling C) Fishing D) Vishing

A

C) Fishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spear phishing?

A

Spear phishing is a targeted attempt to steal sensitive information from a specific individual or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Phishing attempts are always easy to identify.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is whaling in the context of phishing?

A

Whaling is a type of phishing attack that targets high-profile individuals such as executives or important figures within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: Phishing can lead to ________ if sensitive information is successfully obtained.

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What role does social engineering play in phishing?

A

Social engineering techniques are used in phishing to manipulate individuals into divulging confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multiple choice: Which of the following is a common method used in phishing attacks? A) Malware installation B) Fake websites C) Spoofed emails D) All of the above

A

D) All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a common sign of a phishing email?

A

Common signs include poor spelling and grammar, generic greetings, and suspicious links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Phishing attacks are only a concern for individuals and not businesses.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the importance of awareness training in preventing phishing?

A

Awareness training helps individuals recognize phishing attempts and respond appropriately to avoid falling victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fill in the blank: ________ is a technique where attackers use phone calls to trick individuals into revealing personal information.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a phishing kit?

A

A phishing kit is a set of tools used by attackers to create and launch phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Multiple choice: Which of the following can help protect against phishing? A) Using two-factor authentication B) Ignoring all emails C) Sharing passwords D) None of the above

A

A) Using two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the difference between phishing and spear phishing?

A

Phishing is a broad attack targeting many users, while spear phishing targets specific individuals or organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

True or False: Phishing attacks only happen online.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the impact of a successful phishing attack on a business?

A

It can lead to financial loss, data breaches, and damage to reputation.

27
Q

Fill in the blank: Phishing emails often create a sense of ________ to compel users to act quickly.

28
Q

What is the role of antivirus software in combating phishing?

A

Antivirus software can help detect and block malicious links and attachments commonly used in phishing attacks.

29
Q

Multiple choice: What should you do if you receive a suspicious email? A) Click on links B) Report it C) Forward to friends D) Ignore it

A

B) Report it

30
Q

What does the term ‘pharming’ refer to?

A

Pharming is a technique used to redirect users from legitimate websites to fraudulent ones without their knowledge.

31
Q

True or False: Phishing can only occur through email.

32
Q

What is a common tactic used by phishers to make their messages seem legitimate?

A

Using logos and branding of trusted organizations.

33
Q

Why is troubleshooting important to IT professionals?

34
Q

What is troubleshooting in IT?

A

Troubleshooting is the process of diagnosing and resolving problems in computer systems or networks.

35
Q

True or False: Troubleshooting is only necessary when hardware fails.

36
Q

List one reason why troubleshooting is important for IT professionals.

A

It helps maintain system reliability and performance.

37
Q

What is a common first step in troubleshooting?

A

Identifying and defining the problem.

38
Q

Multiple Choice: Which of the following is NOT a troubleshooting technique? A) Isolation B) Analysis C) Ignoring D) Testing

A

C) Ignoring

39
Q

Fill in the blank: Effective troubleshooting can lead to increased ________ in IT systems.

A

productivity

40
Q

What role does documentation play in troubleshooting?

A

Documentation helps track issues and solutions for future reference.

41
Q

True or False: Troubleshooting skills are only required for network administrators.

42
Q

What is the ultimate goal of troubleshooting?

A

To restore normal operation and minimize downtime.

43
Q

Short Answer: Name a tool commonly used in troubleshooting.

A

Ping or traceroute.

44
Q

What does a systematic approach to troubleshooting involve?

A

Following a structured process to identify and resolve issues.

45
Q

Multiple Choice: Which of the following is a common cause of IT issues? A) Human error B) Software bugs C) Hardware failure D) All of the above

A

D) All of the above

46
Q

True or False: Troubleshooting can often be done without user input.

47
Q

What is root cause analysis?

A

A method used to identify the fundamental cause of a problem.

48
Q

Fill in the blank: Troubleshooting helps to prevent ________ in IT systems.

A

future problems

49
Q

What is the significance of testing after troubleshooting?

A

To ensure that the solution effectively resolves the issue.

50
Q

Short Answer: What is one challenge faced during the troubleshooting process?

A

Complexity of systems.

51
Q

Multiple Choice: What should you do first when an IT problem arises? A) Panic B) Analyze the symptoms C) Restart the system D) Call support

A

B) Analyze the symptoms

52
Q

True or False: Troubleshooting is a one-time process.

53
Q

What is the importance of communication in troubleshooting?

A

It ensures all stakeholders are informed and involved in the resolution process.

54
Q

Fill in the blank: A good troubleshooter is ________ and methodical.

A

analytical

55
Q

What does it mean to replicate an issue in troubleshooting?

A

To reproduce the problem in a controlled environment for analysis.

56
Q

Short Answer: Why is it important to keep up with new technologies in troubleshooting?

A

To effectively address emerging issues and utilize new tools.

57
Q

Multiple Choice: Which of the following is a benefit of effective troubleshooting? A) Increased costs B) Decreased user satisfaction C) Reduced downtime D) More complex systems

A

C) Reduced downtime

58
Q

True or False: All IT professionals need troubleshooting skills, regardless of their specialty.

59
Q

What is the role of a troubleshooting checklist?

A

To provide a systematic guide to follow during the troubleshooting process.

60
Q

What is the main difference between Information Security and Cybersecurity?

A

nformation Security focuses on protecting all forms of information (physical and digital) from unauthorized access, use, or damage.
Cybersecurity is a subset of Information Security that specifically protects digital information and systems from cyberattacks, such as hacking or malware.

61
Q

What is the best definition of Information Technology (IT)?

A

Information Technology (IT) refers to the use of computers, networks, software, and other technology to store, manage, and process data to support business operations and communication.

62
Q

What does Information Security primarily focus on?

A

Information Security primarily focuses on protecting all types of information (physical, digital, or intellectual) from unauthorized access, use, disclosure, disruption, modification, or destruction.

63
Q

what defines best cybersecurity?

A

Cybersecurity involves protecting digital systems, networks, and data from cyberattacks, ensuring confidentiality, integrity, and availability while preventing unauthorized access and data breaches

64
Q

What departments are affected by Cybersecurity?

A

Cybersecurity affects all departments, including IT, HR, finance, legal, operations, and marketing, as it ensures the protection of data, systems, and networks across the entire organization.