Bash, the Crucial Exams Chat Bot
AI Bot
Security Concepts Flashcards
Front | Back |
Name a simple countermeasure to protect data transmissions over networks | Use strong encryption protocols |
Name a type of software designed to gain unauthorized access and steal information | Malware |
What do we call a software flaw that malicious actors exploit? | Vulnerability |
What do we call a test that identifies potential vulnerabilities in a system? | Penetration test |
What does the C in CIA stand for? | Confidentiality |
What is a malicious program that can replicate itself without user intervention? | Worm |
What is a secret phrase or sequence used to protect accounts or data? | Password |
What is the practice of converting information into an unreadable format? | Encryption |
What is the process of dividing a network into smaller distinct subnetworks? | Network segmentation |
What is the term for a potential danger that could exploit a vulnerability? | Threat |
What method checks data integrity by detecting unauthorized changes? | Hashing |
What principle ensures users have only the minimum access required? | Least privilege |
What security measure verifies the identity of a user or device? | Authentication |
Which concept involves ensuring data can be traced to its originator? | Non-repudiation |
Which concept is about controlling actions allowed to a user or device? | Authorization |
Which principle ensures data is accurate and unaltered? | Integrity |
Which principle ensures systems are accessible when needed? | Availability |
Which type of attack uses deception to trick users? | Social engineering |
Which type of malware disguises itself as legitimate software? | Trojan horse |
Which type of security measure records and analyzes system events? | Logging and monitoring |
Front
What do we call a software flaw that malicious actors exploit?
Click the card to flip
Back
Vulnerability
Front
What is the process of dividing a network into smaller distinct subnetworks?
Back
Network segmentation
Front
What principle ensures users have only the minimum access required?
Back
Least privilege
Front
What method checks data integrity by detecting unauthorized changes?
Back
Hashing
Front
What does the C in CIA stand for?
Back
Confidentiality
Front
What is a secret phrase or sequence used to protect accounts or data?
Back
Password
Front
Which type of malware disguises itself as legitimate software?
Back
Trojan horse
Front
Which type of security measure records and analyzes system events?
Back
Logging and monitoring
Front
Which type of attack uses deception to trick users?
Back
Social engineering
Front
Which concept involves ensuring data can be traced to its originator?
Back
Non-repudiation
Front
What security measure verifies the identity of a user or device?
Back
Authentication
Front
What is the term for a potential danger that could exploit a vulnerability?
Back
Threat
Front
Which concept is about controlling actions allowed to a user or device?
Back
Authorization
Front
What is a malicious program that can replicate itself without user intervention?
Back
Worm
Front
What do we call a test that identifies potential vulnerabilities in a system?
Back
Penetration test
Front
Which principle ensures systems are accessible when needed?
Back
Availability
Front
Name a simple countermeasure to protect data transmissions over networks
Back
Use strong encryption protocols
Front
Which principle ensures data is accurate and unaltered?
Back
Integrity
Front
Name a type of software designed to gain unauthorized access and steal information
Back
Malware
Front
What is the practice of converting information into an unreadable format?
Back
Encryption
1/20
This deck highlights core security principles, threats, vulnerabilities, and simple countermeasures.