Bash, the Crucial Exams Chat Bot
AI Bot

Cybersecurity Basics  Flashcards

ISC2 Certified in Cybersecurity (CC) Flashcards

FrontBack
What does Availability in the CIA Triad upholdEnsures system and data access are operational when needed
What does Confidentiality in the CIA Triad meanProtecting sensitive information from unauthorized access
What does encryption doConverts data into a coded format to protect it from unauthorized access
What does Integrity in the CIA Triad ensureEnsures data is accurate and unaltered by unauthorized users
What is a firewallA network security device that monitors and blocks or permits traffic based on predefined rules
What is a VPN used forEstablishing secure, encrypted connections over potentially insecure networks
What is a zero-day vulnerabilityA software vulnerability discovered before a fix or patch has been released
What is malwareA type of malicious software intended to disrupt or gain unauthorized access to systems
What is multi-factor authentication (MFA)A security measure requiring two or more verification methods to access resources
What is phishingA type of cyber attack involving fraudulent emails to trick individuals into revealing sensitive information
What is ransomwareMalware designed to encrypt files and demand payment for the decryption key
What is social engineeringManipulating individuals to gain sensitive information or access through psychological tricks
What is the CIA TriadConfidentiality, Integrity, Availability
What is the principle of least privilegeLimiting user access rights to only what is required to perform their job
What is the role of an incident response teamTo handle and resolve cybersecurity incidents effectively and minimize damage
This deck covers foundational cybersecurity concepts, including key terms, principles, and roles relevant to the ISC2 Certified in Cybersecurity exam.
Share on...
Follow us on...