Security Flashcards
Which law focuses on protecting health information in the United States?
HIPAA
What is the purpose of creating separate network segments?
To isolate sensitive information and systems
Why should you be cautious about participating in social media quizzes and games?
They can collect personal data.
What can happen if people rely too much on automated security tools?
They might miss subtle signs of a security breach
What is a zero-day attack?
An attack that exploits an unknown vulnerability
What happens to your purchased apps if you delete them from your device?
You can re-download them without paying again
Which of the following is an example of “Something You Know”?
Passphrase
Why is end-to-end encryption important for instant messaging?
It prevents third parties from reading your messages.
What is a site license?
A license that allows software to be installed on multiple computers for one price.
What is an example of Indirect PII?
Postal code or ZIP code
If you use the same password on multiple sites and one site gets hacked, what should you do?
Change your password on all sites.
What is targeted advertising?
Using your data to show ads for products you might like
What should you do if a virus spreads over a network?
Disconnect the network
Which of the following is a sign of a potentially fake email?
The email contains spelling or grammar mistakes.
Which of the following is a common protocol for encrypting data in transit?
HTTPS
What is a primary reason websites want you to accept their cookies?
To show you more ads based on your interests
What is the first step to remove an app on Windows?
Open Settings and go to Apps
What should you do if you change your mind after deleting an app on macOS?
Drag the app back from the trash can tp the Application Folder
Which of the following is NOT a privacy issue that is related to using a social networking site?
You need to ensure that private information is physically shredded prior to disposal.
Who usually owns the data you share on social media platforms?
The social media platform
Why are computers considered high-value targets?
They are expensive and store valuable data
What is the purpose of creating separate network segments?
To isolate sensitive information and systems
What does the “Detect” function in the NIST Cybersecurity Framework involve?
Monitoring to ensure controls are effective
What is real-time scanning in antivirus software?
Constantly watching your computer for threats
How do you remove an app on Apple’s macOS?
Drag and drop the app to the trash can
What should you do if you see a warning about an expired certificate on a website?
Check the certificate details and proceed with caution if necessary.
What can companies offer if their data gets breached?
Free year of credit monitoring
What can happen if people rely too much on automated security tools?
They might miss subtle signs of a security breach
What does the “C” in the CIA Triad stand for?
Confidentiality
What is a false positive in antivirus software?
When the software detects a virus that isn’t actually harmful
What happens to your purchased apps if you delete them from your device?
You can re-download them without paying again
What is the End User License Agreement (EULA)?
A contract governing the installation and use of software.
What is PII?
Personally Identifiable Information
What is the current standard for WiFi encryption that is considered very secure?
WPA3
Why might your account get flagged when logging in from a different location?
Because logging in from an unfamiliar location looks suspicious.
What does “Integrity” in the CIA Triad guarantee?
Information is stored and transferred as intended
You receive a text message claiming to be from your phone service provider, warning you about unauthorized activity on your account. The message asks you to click on a link to verify your account details.
What should you do?
Call the phone service provider using the number on their official website
Why is encrypting data at rest sometimes more complicated than encrypting data in transit?
Because the encryption keys must be kept secure for a longer period of time
What should you do if a virus spreads over a network?
Disconnect the network
What is an App Store?
A platform where users can search for and download apps
What is the main purpose of data privacy rules?
To keep people’s private information safe
What can companies offer if their data gets breached?
Free year of credit monitoring
What is one benefit of a software subscription model?
You always get the latest version and updates.
What is a Certificate Authority (CA)?
A company that issues security certificates to websites
What is a primary reason websites want you to accept their cookies?
To show you more ads based on your interests
What is data integrity?
The idea that data sent over the Internet is accurate when it arrives
What is a good practice if you’re unsure about a website’s trustworthiness?
Look for reviews about the site or product
What is the next step after agreeing to the license agreement?
Choose the installation location
What should you do if you receive an email that seems to be from a friend but looks suspicious?
Call your friend to verify if they sent it
Why might a company choose to encrypt only certain types of data?
To save money and resources
What is the purpose of the NIST Cybersecurity Framework?
To develop security policies and capabilities