security protocols and Threat Mitigation

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

6

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

30 Terms

1
New cards

What is a secure protocol example?

SSH, HTTPS, TLS, WPA2

2
New cards

What is the purpose of IDS/IPS?

Detecting, preventing intrusions

3
New cards

How to prevent phishing?

Educating users, filtering emails

4
New cards

What is obfuscation?

Hiding data's true meaning

5
New cards

What is tokenization?

Replacing sensitive data with tokens

6
New cards

What is data masking?

Hiding sensitive data parts

7
New cards

Why are strong passwords important?

Preventing unauthorized access

8
New cards

What is a digital certificate's purpose?

Verifying identity, enabling trust

9
New cards

What is a Certificate Authority (CA)?

Issuing, managing certs

10
New cards

Why are patches, updates important?

Fixing vulnerabilities

11
New cards

What is pen testing?

Simulating attacks to test security

12
New cards

How does pen testing help?

Identifying weaknesses

13
New cards

What is a benefit of secure protocols?

Protecting data, comms

14
New cards

What is a security best practice?

Regular updates, patches

15
New cards

What is steganography?

Hiding data in plain sight

16
New cards

What is a type of secure protocol?

Transport Layer Security (TLS)

17
New cards

Why is version control important?

Tracking, managing changes

18
New cards

What is a security risk with outdated software?

Exploitable vulnerabilities

19
New cards

How do CAs support security?

Issuing trusted certs

20
New cards

What is a benefit of intrusion detection?

Alerting to potential attacks

21
New cards

What is a phishing prevention method?

User education, filtering

22
New cards

What is a strong password characteristic?

Complexity, uniqueness

23
New cards

What is a digital cert used for?

Verifying identity, encryption

24
New cards

Why is patch management important?

Fixing vulnerabilities

25
New cards

What is a pen testing goal?

Identifying security weaknesses

26
New cards

What is a secure protocol use case?

Protecting data in transit

27
New cards

What is a benefit of obfuscation?

Hiding sensitive data

28
New cards

What is a security risk with weak passwords?

Unauthorized access

29
New cards

What is a CA's role?

Issuing, managing certs

30
New cards

Why is security testing important?

Identifying vulnerabiliti