Cybersecurity Basics Flashcards
ISC2 Certified in Cybersecurity (CC) Flashcards

| Front | Back |
| What does Availability in the CIA Triad uphold | Ensures system and data access are operational when needed |
| What does Confidentiality in the CIA Triad mean | Protecting sensitive information from unauthorized access |
| What does encryption do | Converts data into a coded format to protect it from unauthorized access |
| What does Integrity in the CIA Triad ensure | Ensures data is accurate and unaltered by unauthorized users |
| What is a firewall | A network security device that monitors and blocks or permits traffic based on predefined rules |
| What is a VPN used for | Establishing secure, encrypted connections over potentially insecure networks |
| What is a zero-day vulnerability | A software vulnerability discovered before a fix or patch has been released |
| What is malware | A type of malicious software intended to disrupt or gain unauthorized access to systems |
| What is multi-factor authentication (MFA) | A security measure requiring two or more verification methods to access resources |
| What is phishing | A type of cyber attack involving fraudulent emails to trick individuals into revealing sensitive information |
| What is ransomware | Malware designed to encrypt files and demand payment for the decryption key |
| What is social engineering | Manipulating individuals to gain sensitive information or access through psychological tricks |
| What is the CIA Triad | Confidentiality, Integrity, Availability |
| What is the principle of least privilege | Limiting user access rights to only what is required to perform their job |
| What is the role of an incident response team | To handle and resolve cybersecurity incidents effectively and minimize damage |
About the Flashcards
Flashcards for the ISC2 Certified in Cybersecurity (CC) exam help students review essential cybersecurity terminology and core principles tested on the exam. The deck reinforces the CIA Triad-confidentiality, integrity, availability-and defines common threats such as phishing, social engineering, malware, ransomware, and zero-day vulnerabilities. Cards present concise definitions and explanations to support quick recall of terms.
It also covers practical defensive measures and response roles like multi-factor authentication, the principle of least privilege, encryption, VPNs, firewalls, and the role of an incident response team, helping learners memorize definitions, protections, and response steps they should know for the exam.
Topics covered in this flashcard deck:
- CIA Triad
- Phishing and social engineering
- Malware and ransomware
- Zero-day vulnerabilities
- Authentication and least privilege
- Encryption, VPNs, firewalls