WEEK1- FUNDAMENTALS

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:08 PM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

26 Terms

1
New cards

What is the primary responsibility of a Network Admin?

Managing network infrastructure and security configurations like firewalls and VPNs.

2
New cards

What is the role of the CISO?

Responsible for strategic security policies and compliance.

3
New cards

What are the three components of the CIA Triad?

Confidentiality, Integrity, and Availability.

4
New cards

What is the main limitation of using a password alone for authentication?

It is a basic form of authentication that is often weak and vulnerable to compromise.

5
New cards

How do passkeys differ from traditional passwords?

They are FIDO-based, passwordless authentication methods that use device biometrics or a PIN.

6
New cards

What is the primary benefit of Single Sign-On (SSO)?

It reduces password fatigue and centralizes authentication by allowing access to multiple systems with one set of credentials.

7
New cards

What is the definition of Multi-Factor Authentication (MFA)?

A security process requiring two or more verification methods to confirm a user's identity.

8
New cards

What are the three categories of MFA factors?

Something you know (password), something you have (token/app), and something you are (biometrics/badge).

9
New cards

Why is patching critical for operating systems?

It closes security gaps and fixes bugs that could be exploited by cybercriminals.

10
New cards

What is a zero-day exploit?

A vulnerability that is exploited by attackers before a patch is available.

11
New cards

What is the function of a VPN?

It creates a secure, encrypted tunnel for data transmission over the internet to protect remote access.

12
New cards

What is social engineering?

Manipulation techniques that exploit human psychology to gain unauthorized access to systems or data.

13
New cards

What is the difference between phishing and whaling?

Phishing is general fraudulent messaging, while whaling is phishing specifically targeted at high-level executives.

14
New cards

What is pharming?

Redirecting users to fake websites via DNS manipulation.

15
New cards

What is the purpose of SPF, DKIM, and DMARC?

They are email authentication mechanisms used to prevent spoofing and ensure email integrity.

16
New cards

What is the difference between an IP address and a MAC address?

An IP address is a numerical identifier for network communication, while a MAC address is a permanent, unique hardware identifier.

17
New cards

How does IPv6 improve upon IPv4?

It uses 128-bit addresses to support vast internet growth and includes better security features compared to the 32-bit IPv4.

18
New cards

What is the role of Network Access Control (NAC)?

To ensure only authorized and compliant devices can access the network.

19
New cards

What is the primary function of a firewall?

To control network traffic based on predefined security rules.

20
New cards

What is the difference between an IDS and an IPS?

An IDS monitors and alerts on suspicious activity, while an IPS proactively blocks threats.

21
New cards

What is the core philosophy of Zero Trust?

Assuming no user or device is trusted by default and requiring constant verification.

22
New cards

What is Data Loss Prevention (DLP)?

A strategy or tool used to prevent sensitive information from being leaked or exfiltrated.

23
New cards

What is the purpose of Outlook email rules in a security context?

To automatically sort, flag, or isolate suspicious emails based on sender, keywords, or attachments.

24
New cards

What is the role of the Help Desk in security?

Providing user support and escalating security incidents.

25
New cards

What is the main goal of security awareness training?

To educate users on security threats, as humans are often the weakest link in security.

26
New cards

What does 'encryption at rest' mean?

Protecting data while it is stored on a device or server.

Explore top notes

note
Ap euro: Unit 2
Updated 1259d ago
0.0(0)
note
NaOH Titration Flashcards
Updated 314d ago
0.0(0)
note
The Italian Renaissance.
Updated 254d ago
0.0(0)
note
Nurse Unit Vocabulary 2023
Updated 1162d ago
0.0(0)
note
Ap euro: Unit 2
Updated 1259d ago
0.0(0)
note
NaOH Titration Flashcards
Updated 314d ago
0.0(0)
note
The Italian Renaissance.
Updated 254d ago
0.0(0)
note
Nurse Unit Vocabulary 2023
Updated 1162d ago
0.0(0)

Explore top flashcards

flashcards
Unit 6: Simple Harmonic Motion
20
Updated 888d ago
0.0(0)
flashcards
Capitulum 24 (Non verb)
23
Updated 415d ago
0.0(0)
flashcards
Waves
38
Updated 659d ago
0.0(0)
flashcards
GCSE Future Plans
48
Updated 1204d ago
0.0(0)
flashcards
Peds E1- Emphasized only
309
Updated 426d ago
0.0(0)
flashcards
Unit 6: Simple Harmonic Motion
20
Updated 888d ago
0.0(0)
flashcards
Capitulum 24 (Non verb)
23
Updated 415d ago
0.0(0)
flashcards
Waves
38
Updated 659d ago
0.0(0)
flashcards
GCSE Future Plans
48
Updated 1204d ago
0.0(0)
flashcards
Peds E1- Emphasized only
309
Updated 426d ago
0.0(0)