Cyber Security Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

flashcard set

Earn XP

Description and Tags

Flashcards based on lecture notes about cyber security concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

What does Cyber Security provide security against?

Malware, cyber-terrorists, and other threats

2
New cards

Who is popularly known as the father of cyber security?

Robert August Kerckhoffs

3
New cards

Which of the below does not constitute a cybercrime?

AES (Advanced Encryption Standard)

4
New cards

Which of the below benefits of cyber security is not true?

System getting slower, Computer lagging and crashes

5
New cards

Which of the below does not qualify as a form of peer-to-peer cybercrime?

Phishing

6
New cards

Any company or agency’s IT protection is managed and maintained by _.

IT Security Engineer

7
New cards

Which of the below security encryption standards is the weakest?

WEP

8
New cards

Which of the below measures can help reduce the risk of data leakage?

Authentication

9
New cards

___ means the security of data from tampering by unidentified users.

Integrity

10
New cards

Which of the below implemented is not a good means of safeguarding privacy?

Switching off the phone

11
New cards

The authenticity and security of data travelling over a network are ensured by ____.

Network-security protocols

12
New cards

A single entrance for multiple connectivity is called as ____.

Directory service

13
New cards

The initial phase of ethical hacking is _.

Foot printing

14
New cards

In system hacking, which of the below is the most crucial activity?

Cracking passwords

15
New cards

Which of the below cyber security principles states that the security system should be as compact and straightforward as possible?

The economy of the Mechanism

16
New cards

The first hacker’s conference was held in which of the below locations?

DEFCON

17
New cards

Which of the below is used to analyse network flow and monitor traffic?

Network traffic analysis

18
New cards

_ are programmes or procedures that enable hackers to maintain control of a computer system.

Exploits

19
New cards

What does Cyber Security do?

Provides security against malware, provides security against cyber-terrorists, protects a system from cyber attacks

20
New cards

Which of the following is a type of cyber security?

Cloud Security, Network Security, Application Security

21
New cards

What are the features of cyber security?

Compliance, Defence against internal threats, Threat Prevention

22
New cards

Which of the following is an objective of network security?

Confidentiality, Integrity, Availability

23
New cards

Which of the following is a type of cyber attack?

Phishing, SQL Injections, Password Attack

24
New cards

In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?

1983

25
New cards

Which of the following act violates cyber security?

Exploit, Attack, Threat, Vulnerability

26
New cards

Which of the following is defined as an attempt to harm, damage or cause threat to a system or network

Cyber Attack

27
New cards

What is the existence of weakness in a system or network is known as?

Vulnerability

28
New cards

Which of the following is not a step followed by cyber- criminals in data breaching?

Fixing the bugs

29
New cards

Which of the following term refers to a group of hackers who are both white and black hat?

Grey Hat hackers

30
New cards

Which of the following is not an email-related hacking tool?

Sendinc

31
New cards

Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?

botnets

32
New cards

Which of the following is a Stuxnet?

Worm

33
New cards

Which of the following can diminish the chance of data leakage?

Authentication