Bash, the Crucial Exams Chat Bot
AI Bot
Cybersecurity Basics Flashcards
ISC2 Certified in Cybersecurity (CC) Flashcards
| Front | Back |
| What does Availability in the CIA Triad uphold | Ensures system and data access are operational when needed |
| What does Confidentiality in the CIA Triad mean | Protecting sensitive information from unauthorized access |
| What does encryption do | Converts data into a coded format to protect it from unauthorized access |
| What does Integrity in the CIA Triad ensure | Ensures data is accurate and unaltered by unauthorized users |
| What is a firewall | A network security device that monitors and blocks or permits traffic based on predefined rules |
| What is a VPN used for | Establishing secure, encrypted connections over potentially insecure networks |
| What is a zero-day vulnerability | A software vulnerability discovered before a fix or patch has been released |
| What is malware | A type of malicious software intended to disrupt or gain unauthorized access to systems |
| What is multi-factor authentication (MFA) | A security measure requiring two or more verification methods to access resources |
| What is phishing | A type of cyber attack involving fraudulent emails to trick individuals into revealing sensitive information |
| What is ransomware | Malware designed to encrypt files and demand payment for the decryption key |
| What is social engineering | Manipulating individuals to gain sensitive information or access through psychological tricks |
| What is the CIA Triad | Confidentiality, Integrity, Availability |
| What is the principle of least privilege | Limiting user access rights to only what is required to perform their job |
| What is the role of an incident response team | To handle and resolve cybersecurity incidents effectively and minimize damage |
This deck covers foundational cybersecurity concepts, including key terms, principles, and roles relevant to the ISC2 Certified in Cybersecurity exam.