Bash, the Crucial Exams Chat Bot
AI Bot
Tech+ Security and Best Practices Flashcards
CompTIA Tech+ FC0-U71 (V6) Flashcards
| Front | Back |
| How can you detect a suspicious email attachment? | By checking for unexpected file types, verifying the sender, and scanning with antivirus software. |
| How does encryption protect data? | It converts data into an unreadable format that can only be decoded by someone with the appropriate key. |
| Name a strong password practice. | Use a mix of uppercase and lowercase letters, numbers, and symbols while avoiding easily guessable words. |
| What does role-based access control (RBAC) entail? | Limiting system access by assigning permissions according to a user's role in the organization. |
| What is a common sign that a system may have been compromised? | Unexplained system behavior or unexpected communications with unknown external addresses. |
| What is a zero-day vulnerability? | A software flaw that is exploited before the vendor is aware or can release a patch |
| What is an intrusion detection system (IDS)? | A solution that monitors networks or systems for malicious activities or policy violations |
| What is malware? | Software specifically designed to disrupt, harm, or gain unauthorized access to systems |
| What is multi-factor authentication (MFA)? | A security method that requires two or more verification methods to confirm a user's identity. |
| What is phishing? | A social engineering attack where attackers impersonate trusted entities to steal sensitive information. |
| What is shoulder surfing? | Stealing information by looking over someone's shoulder as they enter sensitive data |
| What is social engineering in the context of cybersecurity? | The manipulation of individuals into divulging confidential information. |
| What is tailgating in the context of security? | Following an authorized person into a restricted area without proper credentials |
| What is the difference between a virus and a worm? | A virus attaches itself to a host file/program while a worm is self-replicating and spreads without user interaction |
| What is the primary role of a firewall? | To monitor and regulate incoming and outgoing network traffic based on predetermined security rules. |
| What is the principle of least privilege? | It is the idea that users should only have the minimum level of access necessary to perform their tasks. |
| What is the purpose of a software patch? | To fix bugs, address security vulnerabilities, and improve functionality |
| Why is it important to lock your device when stepping away? | To prevent unauthorized access to files and accounts |
| Why should you regularly install updates and patches? | They often include critical security fixes that protect against known vulnerabilities |
| Why use secure or encrypted Wi-Fi networks? | Unsecured networks can allow attackers to intercept or eavesdrop on your data transmissions |
This deck focuses on security fundamentals, including safe computing practices, access control, and basic threat identification.