1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does each letter in the CIA Triad stand for?
Confidentiality, Integrity, Availability.
What are the three stages of data?
Data in Transit, Data at Rest, Data in Use.
What is the formula for the model of cybersecurity?
Protection = Prevention + (Detection + Response).
What are the three types of authentication factors?
Something you know, Something you have, Something you are.
What is a Brute Force Attack?
An attack where multiple passwords are tried for one account.
What is a Hash Collision?
A situation where two different inputs produce the same hash output.
Define Social Engineering.
To get an authorized user to give information or access to an unauthorized person.
What is Phishing?
The use of bogus emails and websites to trick individuals into providing confidential or personal information.
What is pointed out by the Least Privilege Principle in cybersecurity?
Provide each user with the minimum system access needed to perform their tasks.
What is the 3-2-1 rule of backups?
3 copies of data: 2 copies stored on different devices, and 1 copy offsite or in the cloud.
What is the main goal of password hashing?
To securely store passwords in a way that makes them hard to retrieve in their original form.
What does OSINT stand for?
Open Source Intelligence.
What is the difference between a backup and syncing with cloud services like Google Drive?
A backup is a static snapshot of data; syncing means changes in one location reflect in another.
What is Cryptanalysis?
Attempting to break a cryptographic system and return the encrypted message to plaintext.
What is an example of a password attack technique?
Password Spraying, Credential Surfing, or Brute Force Attack.
What is a Token in authentication methods?
A physical device used to authenticate a user's identity.
What are the main tools provided by Windows Security Center?
Firewall & Network Protection, Virus and Threat Protection, User Account Control, App and Browser Control.
What does the term "Salt" refer to in password security?
Random data added to passwords before hashing to ensure unique hash outputs.
What is meant by System Hardening?
The process of limiting potential weaknesses that make systems vulnerable to cyber attacks.
What is a common vulnerability scanner?
An automated tool that connects to a system and identifies known vulnerabilities.