1/25
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is the primary responsibility of a Network Admin?
Managing network infrastructure and security configurations like firewalls and VPNs.
What is the role of the CISO?
Responsible for strategic security policies and compliance.
What are the three components of the CIA Triad?
Confidentiality, Integrity, and Availability.
What is the main limitation of using a password alone for authentication?
It is a basic form of authentication that is often weak and vulnerable to compromise.
How do passkeys differ from traditional passwords?
They are FIDO-based, passwordless authentication methods that use device biometrics or a PIN.
What is the primary benefit of Single Sign-On (SSO)?
It reduces password fatigue and centralizes authentication by allowing access to multiple systems with one set of credentials.
What is the definition of Multi-Factor Authentication (MFA)?
A security process requiring two or more verification methods to confirm a user's identity.
What are the three categories of MFA factors?
Something you know (password), something you have (token/app), and something you are (biometrics/badge).
Why is patching critical for operating systems?
It closes security gaps and fixes bugs that could be exploited by cybercriminals.
What is a zero-day exploit?
A vulnerability that is exploited by attackers before a patch is available.
What is the function of a VPN?
It creates a secure, encrypted tunnel for data transmission over the internet to protect remote access.
What is social engineering?
Manipulation techniques that exploit human psychology to gain unauthorized access to systems or data.
What is the difference between phishing and whaling?
Phishing is general fraudulent messaging, while whaling is phishing specifically targeted at high-level executives.
What is pharming?
Redirecting users to fake websites via DNS manipulation.
What is the purpose of SPF, DKIM, and DMARC?
They are email authentication mechanisms used to prevent spoofing and ensure email integrity.
What is the difference between an IP address and a MAC address?
An IP address is a numerical identifier for network communication, while a MAC address is a permanent, unique hardware identifier.
How does IPv6 improve upon IPv4?
It uses 128-bit addresses to support vast internet growth and includes better security features compared to the 32-bit IPv4.
What is the role of Network Access Control (NAC)?
To ensure only authorized and compliant devices can access the network.
What is the primary function of a firewall?
To control network traffic based on predefined security rules.
What is the difference between an IDS and an IPS?
An IDS monitors and alerts on suspicious activity, while an IPS proactively blocks threats.
What is the core philosophy of Zero Trust?
Assuming no user or device is trusted by default and requiring constant verification.
What is Data Loss Prevention (DLP)?
A strategy or tool used to prevent sensitive information from being leaked or exfiltrated.
What is the purpose of Outlook email rules in a security context?
To automatically sort, flag, or isolate suspicious emails based on sender, keywords, or attachments.
What is the role of the Help Desk in security?
Providing user support and escalating security incidents.
What is the main goal of security awareness training?
To educate users on security threats, as humans are often the weakest link in security.
What does 'encryption at rest' mean?
Protecting data while it is stored on a device or server.