Week Two - Cybersecurity Basic Flashcards

1
Q

What’s the core idea of cybersecurity?

A

Protecting systems, data, and users from getting hacked, leaked, or misused.

Basically—it’s about keeping people out who shouldn’t be in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the biggest weak point in most cyber breaches?

A

Humans. Most attacks start with someone clicking a bad link or reusing weak passwords.

It’s almost always people, not tech, that opens the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s phishing?

A

Fake messages (usually emails) that trick people into giving up passwords or clicking malicious links.

It’s like someone pretending to be your boss and asking you to send a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s MFA and why do companies use it?

A

Multi-Factor Authentication—extra login step using your phone or app. Makes it way harder for hackers to break in.

Even if they get your password, MFA stops them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ‘encryption’ actually do?

A

It scrambles your data so only the right people (with the key) can read it.

Even if someone steals it, it’s gibberish without the unlock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a firewall?

A

A barrier that filters what gets in or out of a network. Stops sketchy traffic before it reaches systems.

Think of it like a bouncer—it keeps bad traffic out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s ransomware?

A

A type of attack where hackers lock your files and demand money to unlock them.

They hijack your system and hold it hostage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why do companies care about ‘endpoint protection’?

A

It secures devices like laptops and phones so they don’t become entry points for attackers.

Even one vulnerable laptop can put the whole company at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the point of SOC 2 or similar security certifications?

A

They prove a company takes data protection seriously—often required in B2B SaaS.

It’s like a trust badge that shows you’re not reckless with customer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does it mean when someone says ‘we follow a zero trust model’?

A

It means no one—inside or outside the company—automatically gets access. Every user and device has to verify constantly.

It’s like: trust no one, even inside the house. Prove who you are, every time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly