1/29
6
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What is a secure protocol example?
SSH, HTTPS, TLS, WPA2
What is the purpose of IDS/IPS?
Detecting, preventing intrusions
How to prevent phishing?
Educating users, filtering emails
What is obfuscation?
Hiding data's true meaning
What is tokenization?
Replacing sensitive data with tokens
What is data masking?
Hiding sensitive data parts
Why are strong passwords important?
Preventing unauthorized access
What is a digital certificate's purpose?
Verifying identity, enabling trust
What is a Certificate Authority (CA)?
Issuing, managing certs
Why are patches, updates important?
Fixing vulnerabilities
What is pen testing?
Simulating attacks to test security
How does pen testing help?
Identifying weaknesses
What is a benefit of secure protocols?
Protecting data, comms
What is a security best practice?
Regular updates, patches
What is steganography?
Hiding data in plain sight
What is a type of secure protocol?
Transport Layer Security (TLS)
Why is version control important?
Tracking, managing changes
What is a security risk with outdated software?
Exploitable vulnerabilities
How do CAs support security?
Issuing trusted certs
What is a benefit of intrusion detection?
Alerting to potential attacks
What is a phishing prevention method?
User education, filtering
What is a strong password characteristic?
Complexity, uniqueness
What is a digital cert used for?
Verifying identity, encryption
Why is patch management important?
Fixing vulnerabilities
What is a pen testing goal?
Identifying security weaknesses
What is a secure protocol use case?
Protecting data in transit
What is a benefit of obfuscation?
Hiding sensitive data
What is a security risk with weak passwords?
Unauthorized access
What is a CA's role?
Issuing, managing certs
Why is security testing important?
Identifying vulnerabiliti