Bash, the Crucial Exams Chat Bot
AI Bot
Tech+ Security and Best Practices Flashcards
Front | Back |
How can you detect a suspicious email attachment? | By checking for unexpected file types, verifying the sender, and scanning with antivirus software. |
How does encryption protect data? | It converts data into an unreadable format that can only be decoded by someone with the appropriate key. |
Name a strong password practice. | Use a mix of uppercase and lowercase letters, numbers, and symbols while avoiding easily guessable words. |
What does role-based access control (RBAC) entail? | Limiting system access by assigning permissions according to a user's role in the organization. |
What is a common sign that a system may have been compromised? | Unexplained system behavior or unexpected communications with unknown external addresses. |
What is a zero-day vulnerability? | A software flaw that is exploited before the vendor is aware or can release a patch |
What is an intrusion detection system (IDS)? | A solution that monitors networks or systems for malicious activities or policy violations |
What is malware? | Software specifically designed to disrupt, harm, or gain unauthorized access to systems |
What is multi-factor authentication (MFA)? | A security method that requires two or more verification methods to confirm a user's identity. |
What is phishing? | A social engineering attack where attackers impersonate trusted entities to steal sensitive information. |
What is shoulder surfing? | Stealing information by looking over someone's shoulder as they enter sensitive data |
What is social engineering in the context of cybersecurity? | The manipulation of individuals into divulging confidential information. |
What is tailgating in the context of security? | Following an authorized person into a restricted area without proper credentials |
What is the difference between a virus and a worm? | A virus attaches itself to a host file/program while a worm is self-replicating and spreads without user interaction |
What is the primary role of a firewall? | To monitor and regulate incoming and outgoing network traffic based on predetermined security rules. |
What is the principle of least privilege? | It is the idea that users should only have the minimum level of access necessary to perform their tasks. |
What is the purpose of a software patch? | To fix bugs, address security vulnerabilities, and improve functionality |
Why is it important to lock your device when stepping away? | To prevent unauthorized access to files and accounts |
Why should you regularly install updates and patches? | They often include critical security fixes that protect against known vulnerabilities |
Why use secure or encrypted Wi-Fi networks? | Unsecured networks can allow attackers to intercept or eavesdrop on your data transmissions |
Front
Why is it important to lock your device when stepping away?
Click the card to flip
Back
To prevent unauthorized access to files and accounts
Front
What is tailgating in the context of security?
Back
Following an authorized person into a restricted area without proper credentials
Front
What is a zero-day vulnerability?
Back
A software flaw that is exploited before the vendor is aware or can release a patch
Front
How can you detect a suspicious email attachment?
Back
By checking for unexpected file types, verifying the sender, and scanning with antivirus software.
Front
What is phishing?
Back
A social engineering attack where attackers impersonate trusted entities to steal sensitive information.
Front
Why use secure or encrypted Wi-Fi networks?
Back
Unsecured networks can allow attackers to intercept or eavesdrop on your data transmissions
Front
How does encryption protect data?
Back
It converts data into an unreadable format that can only be decoded by someone with the appropriate key.
Front
What is the primary role of a firewall?
Back
To monitor and regulate incoming and outgoing network traffic based on predetermined security rules.
Front
What is malware?
Back
Software specifically designed to disrupt, harm, or gain unauthorized access to systems
Front
What is the principle of least privilege?
Back
It is the idea that users should only have the minimum level of access necessary to perform their tasks.
Front
What is a common sign that a system may have been compromised?
Back
Unexplained system behavior or unexpected communications with unknown external addresses.
Front
What is an intrusion detection system (IDS)?
Back
A solution that monitors networks or systems for malicious activities or policy violations
Front
What is social engineering in the context of cybersecurity?
Back
The manipulation of individuals into divulging confidential information.
Front
What is shoulder surfing?
Back
Stealing information by looking over someone's shoulder as they enter sensitive data
Front
What does role-based access control (RBAC) entail?
Back
Limiting system access by assigning permissions according to a user's role in the organization.
Front
Why should you regularly install updates and patches?
Back
They often include critical security fixes that protect against known vulnerabilities
Front
Name a strong password practice.
Back
Use a mix of uppercase and lowercase letters, numbers, and symbols while avoiding easily guessable words.
Front
What is the difference between a virus and a worm?
Back
A virus attaches itself to a host file/program while a worm is self-replicating and spreads without user interaction
Front
What is the purpose of a software patch?
Back
To fix bugs, address security vulnerabilities, and improve functionality
Front
What is multi-factor authentication (MFA)?
Back
A security method that requires two or more verification methods to confirm a user's identity.
1/20
This deck focuses on security fundamentals, including safe computing practices, access control, and basic threat identification.