Bash, the Crucial Exams Chat Bot
AI Bot

Cybersecurity Fundamentals and Threat Landscape (CCST) Flashcards

Cisco CCST Cybersecurity 100-160 Flashcards

Study our Cybersecurity Fundamentals and Threat Landscape (CCST) flashcards for the Cisco CCST Cybersecurity 100-160 exam with 45+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Cisco CCST Cybersecurity 100-160 Course Header Image
FrontBack
Authentication vs Authorization differenceAuthentication verifies identity Authorization grants permissions
Availability definitionEnsuring authorized users have access when needed
Backup types full incremental differentialFull copies incremental backups of changes differential backups since last full
Brute force attack methodTrying many passwords until one succeeds
Business continuity vs Disaster recoveryBusiness continuity maintains operations Disaster recovery restores IT systems
Certificate revocation methodsCRL and OCSP used to check revoked certificates
CIA triad - what are the three principlesConfidentiality Integrity Availability
Common malware typesMallet virus worm trojan ransomware spyware rootkit
Compliance vs Security differenceCompliance meets specific regulatory requirements Security reduces overall risk
Confidentiality definitionProtecting information from unauthorized access
Cross Site Scripting XSS basic conceptAttacker injects script into web pages viewed by other users
Defense in Depth conceptMultiple layered security controls reduce risk
Denial of Service vs Distributed Denial of ServiceDoS originates from one source DDoS originates from many compromised hosts
Digital signature purposeProvides authentication integrity and non repudiation of messages
Hash function property collision resistanceDifficult to find two inputs with the same hash
Incident response phasesPreparation Detection Containment Eradication Recovery Lessons learned
Insider threat examplesMalicious or negligent employees contractors or partners
Integrity definitionEnsuring data is accurate and unaltered
Man in the Middle attack basic ideaAttacker intercepts and possibly alters communication between parties
Multi factor authentication factorsKnowledge possession and inherence
NIST role in cybersecurityProvides frameworks guidelines and standards for security practices
OWASP Top 10 relevanceCommon web application security risks to prioritize
Password hashing and salting purposeHashing stores irreversible digests Salting prevents rainbow table attacks
Penetration testing vs Vulnerability scanningPen test actively exploits vulnerabilities Scan identifies possible issues
Phishing definitionDeceptive emails to steal credentials or deliver malware
Preventive Detective Corrective controls examplesPreventive firewall Detective IDS Corrective patching
Principle of Least PrivilegeUsers get only the access needed to perform their role
Privacy law examplesGDPR HIPAA and other regulations govern personal data protection
Public Key Infrastructure PKI componentsCertificates Certificate Authority CA Private keys and CRL or OCSP
Ransomware primary behaviorEncrypts files and demands payment for decryption
Risk assessment basic stepsIdentify assets Assess threats Identify vulnerabilities Evaluate likelihood and impact
Risk responsesAvoid Mitigate Transfer Accept
Security policy purposeDefines rules and expectations for secure behavior and system use
Social engineering common techniquesPretexting baiting tailgating and impersonation
Spear phishing differenceTargeted phishing aimed at specific individuals or organizations
SQL Injection basic conceptAttacker injects malicious SQL to manipulate a database
Supply chain attack definitionCompromise occurs in a third party component or vendor
Symmetric vs Asymmetric encryption differenceSymmetric uses one shared key Asymmetric uses public and private key pair
TLS purposeEncrypts traffic between client and server to provide confidentiality and integrity
Tokenization vs Encryption differenceTokenization replaces data with tokens Encryption transforms data with keys
Trojan horse characteristicDisguises as legitimate software to deliver a payload
Virus vs Worm key differenceVirus needs a host Worm self propagates across networks
Vishing and Smishing definitionsVishing uses voice calls Smishing uses SMS messages
Whaling targetPhishing aimed at high value targets like executives
Zero day vulnerability definitionVulnerability unknown to vendor with no available patch

About the Flashcards

Flashcards for the Cisco CCST Cybersecurity exam provide a concise study tool to review essential terminology, concepts, and definitions tested on the exam. They help you practice quick recall of core ideas like the CIA triad, authentication versus authorization, types of controls (preventive, detective, corrective), and the principle of least privilege.

Cards also summarize common threats and defenses: malware types (virus, worm, trojan, ransomware), social engineering (phishing, spear phishing, vishing, smishing, whaling), network and web attacks (DoS/DDoS, MITM, SQL injection, XSS), cryptography and PKI (symmetric vs asymmetric, hashing, TLS, certificates), plus risk assessment, incident response, and compliance topics like NIST, GDPR, and HIPAA.

Topics covered in this flashcard deck:

  • CIA triad
  • Authentication and authorization
  • Malware and social engineering
  • Cryptography and PKI
  • Web application vulnerabilities
  • Risk management and compliance
Share on...
Follow us on...