Objective 2.0: Security Flashcards

1
Q

What is the difference between a firewall and an antivirus?

A

A firewall controls incoming and outgoing network traffic based on security rules, while antivirus software detects, prevents, and removes malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a UAC (User Account Control) in Windows?

A

UAC helps prevent unauthorized changes to the operating system by prompting for administrative approval when making system changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of BitLocker in Windows?

A

BitLocker provides full disk encryption to protect data from unauthorized access if a device is lost or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name three types of authentication factors.

A

Something you know (password), something you have (smart card), and something you are (fingerprint).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of least privilege?

A

It means granting users only the permissions they need to perform their job functions, reducing the risk of accidental or malicious actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is social engineering?

A

Social engineering is the manipulation of people into divulging confidential information or performing actions that compromise security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two common methods of data encryption?

A

Symmetric encryption (same key for encryption and decryption) and asymmetric encryption (public and private keys).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you protect against phishing attacks?

A

Be cautious of unsolicited emails, verify the sender’s identity, avoid clicking on suspicious links, and use email filtering tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is multi-factor authentication (MFA)?

A

MFA requires two or more independent authentication factors to verify a user’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a security policy in an organization?

A

It defines the organization’s approach to securing its information systems, including rules and procedures for handling sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly