Bash, the Crucial Exams Chat Bot
AI Bot

Security Concepts Flashcards

Availability
What principle ensures users have only the minimum access required?
Authorization
Hashing
What method checks data integrity by detecting unauthorized changes?
Which principle ensures systems are accessible when needed?
Least privilege
Threat
What is the term for a potential danger that could exploit a vulnerability?
What do we call a software flaw that malicious actors exploit?
Vulnerability
Which concept is about controlling actions allowed to a user or device?
FrontBack
Name a simple countermeasure to protect data transmissions over networksUse strong encryption protocols
Name a type of software designed to gain unauthorized access and steal informationMalware
What do we call a software flaw that malicious actors exploit?Vulnerability
What do we call a test that identifies potential vulnerabilities in a system?Penetration test
What does the C in CIA stand for?Confidentiality
What is a malicious program that can replicate itself without user intervention?Worm
What is a secret phrase or sequence used to protect accounts or data?Password
What is the practice of converting information into an unreadable format?Encryption
What is the process of dividing a network into smaller distinct subnetworks?Network segmentation
What is the term for a potential danger that could exploit a vulnerability?Threat
What method checks data integrity by detecting unauthorized changes?Hashing
What principle ensures users have only the minimum access required?Least privilege
What security measure verifies the identity of a user or device?Authentication
Which concept involves ensuring data can be traced to its originator?Non-repudiation
Which concept is about controlling actions allowed to a user or device?Authorization
Which principle ensures data is accurate and unaltered?Integrity
Which principle ensures systems are accessible when needed?Availability
Which type of attack uses deception to trick users?Social engineering
Which type of malware disguises itself as legitimate software?Trojan horse
Which type of security measure records and analyzes system events?Logging and monitoring
Front
What do we call a software flaw that malicious actors exploit?
Click the card to flip
Back
Vulnerability
Front
What is the process of dividing a network into smaller distinct subnetworks?
Back
Network segmentation
Front
What principle ensures users have only the minimum access required?
Back
Least privilege
Front
What method checks data integrity by detecting unauthorized changes?
Back
Hashing
Front
What does the C in CIA stand for?
Back
Confidentiality
Front
What is a secret phrase or sequence used to protect accounts or data?
Back
Password
Front
Which type of malware disguises itself as legitimate software?
Back
Trojan horse
Front
Which type of security measure records and analyzes system events?
Back
Logging and monitoring
Front
Which type of attack uses deception to trick users?
Back
Social engineering
Front
Which concept involves ensuring data can be traced to its originator?
Back
Non-repudiation
Front
What security measure verifies the identity of a user or device?
Back
Authentication
Front
What is the term for a potential danger that could exploit a vulnerability?
Back
Threat
Front
Which concept is about controlling actions allowed to a user or device?
Back
Authorization
Front
What is a malicious program that can replicate itself without user intervention?
Back
Worm
Front
What do we call a test that identifies potential vulnerabilities in a system?
Back
Penetration test
Front
Which principle ensures systems are accessible when needed?
Back
Availability
Front
Name a simple countermeasure to protect data transmissions over networks
Back
Use strong encryption protocols
Front
Which principle ensures data is accurate and unaltered?
Back
Integrity
Front
Name a type of software designed to gain unauthorized access and steal information
Back
Malware
Front
What is the practice of converting information into an unreadable format?
Back
Encryption
1/20
This deck highlights core security principles, threats, vulnerabilities, and simple countermeasures.
Share on...
Follow us on...