Security Flashcards

1
Q

Which law focuses on protecting health information in the United States?

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of creating separate network segments?

A

To isolate sensitive information and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why should you be cautious about participating in social media quizzes and games?

A

They can collect personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can happen if people rely too much on automated security tools?

A

They might miss subtle signs of a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a zero-day attack?

A

An attack that exploits an unknown vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens to your purchased apps if you delete them from your device?

A

You can re-download them without paying again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an example of “Something You Know”?

A

Passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is end-to-end encryption important for instant messaging?

A

It prevents third parties from reading your messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a site license?

A

A license that allows software to be installed on multiple computers for one price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of Indirect PII?

A

Postal code or ZIP code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you use the same password on multiple sites and one site gets hacked, what should you do?

A

Change your password on all sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is targeted advertising?

A

Using your data to show ads for products you might like

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you do if a virus spreads over a network?

A

Disconnect the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a sign of a potentially fake email?

A

The email contains spelling or grammar mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a common protocol for encrypting data in transit?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a primary reason websites want you to accept their cookies?

A

To show you more ads based on your interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the first step to remove an app on Windows?

A

Open Settings and go to Apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What should you do if you change your mind after deleting an app on macOS?

A

Drag the app back from the trash can tp the Application Folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is NOT a privacy issue that is related to using a social networking site?

A

You need to ensure that private information is physically shredded prior to disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who usually owns the data you share on social media platforms?

A

The social media platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why are computers considered high-value targets?

A

They are expensive and store valuable data

22
Q

What is the purpose of creating separate network segments?

A

To isolate sensitive information and systems

23
Q

What does the “Detect” function in the NIST Cybersecurity Framework involve?

A

Monitoring to ensure controls are effective

24
Q

What is real-time scanning in antivirus software?

A

Constantly watching your computer for threats

25
Q

How do you remove an app on Apple’s macOS?

A

Drag and drop the app to the trash can

26
Q

What should you do if you see a warning about an expired certificate on a website?

A

Check the certificate details and proceed with caution if necessary.

27
Q

What can companies offer if their data gets breached?

A

Free year of credit monitoring

28
Q

What can happen if people rely too much on automated security tools?

A

They might miss subtle signs of a security breach

29
Q

What does the “C” in the CIA Triad stand for?

A

Confidentiality

30
Q

What is a false positive in antivirus software?

A

When the software detects a virus that isn’t actually harmful

31
Q

What happens to your purchased apps if you delete them from your device?

A

You can re-download them without paying again

32
Q

What is the End User License Agreement (EULA)?

A

A contract governing the installation and use of software.

33
Q

What is PII?

A

Personally Identifiable Information

34
Q

What is the current standard for WiFi encryption that is considered very secure?

35
Q

Why might your account get flagged when logging in from a different location?

A

Because logging in from an unfamiliar location looks suspicious.

36
Q

What does “Integrity” in the CIA Triad guarantee?

A

Information is stored and transferred as intended

37
Q

You receive a text message claiming to be from your phone service provider, warning you about unauthorized activity on your account. The message asks you to click on a link to verify your account details.

What should you do?

A

Call the phone service provider using the number on their official website

38
Q

Why is encrypting data at rest sometimes more complicated than encrypting data in transit?

A

Because the encryption keys must be kept secure for a longer period of time

39
Q

What should you do if a virus spreads over a network?

A

Disconnect the network

40
Q

What is an App Store?

A

A platform where users can search for and download apps

41
Q

What is the main purpose of data privacy rules?

A

To keep people’s private information safe

42
Q

What can companies offer if their data gets breached?

A

Free year of credit monitoring

43
Q

What is one benefit of a software subscription model?

A

You always get the latest version and updates.

44
Q

What is a Certificate Authority (CA)?

A

A company that issues security certificates to websites

45
Q

What is a primary reason websites want you to accept their cookies?

A

To show you more ads based on your interests

46
Q

What is data integrity?

A

The idea that data sent over the Internet is accurate when it arrives

47
Q

What is a good practice if you’re unsure about a website’s trustworthiness?

A

Look for reviews about the site or product

48
Q

What is the next step after agreeing to the license agreement?

A

Choose the installation location

49
Q

What should you do if you receive an email that seems to be from a friend but looks suspicious?

A

Call your friend to verify if they sent it

50
Q

Why might a company choose to encrypt only certain types of data?

A

To save money and resources

51
Q

What is the purpose of the NIST Cybersecurity Framework?

A

To develop security policies and capabilities