Bash, the Crucial Exams Chat Bot
AI Bot
Cybersecurity Basics Flashcards
ISC2 Certified in Cybersecurity (CC) Flashcards
| Front | Back |
| What does Availability in the CIA Triad uphold | Ensures system and data access are operational when needed |
| What does Confidentiality in the CIA Triad mean | Protecting sensitive information from unauthorized access |
| What does encryption do | Converts data into a coded format to protect it from unauthorized access |
| What does Integrity in the CIA Triad ensure | Ensures data is accurate and unaltered by unauthorized users |
| What is a firewall | A network security device that monitors and blocks or permits traffic based on predefined rules |
| What is a VPN used for | Establishing secure, encrypted connections over potentially insecure networks |
| What is a zero-day vulnerability | A software vulnerability discovered before a fix or patch has been released |
| What is malware | A type of malicious software intended to disrupt or gain unauthorized access to systems |
| What is multi-factor authentication (MFA) | A security measure requiring two or more verification methods to access resources |
| What is phishing | A type of cyber attack involving fraudulent emails to trick individuals into revealing sensitive information |
| What is ransomware | Malware designed to encrypt files and demand payment for the decryption key |
| What is social engineering | Manipulating individuals to gain sensitive information or access through psychological tricks |
| What is the CIA Triad | Confidentiality, Integrity, Availability |
| What is the principle of least privilege | Limiting user access rights to only what is required to perform their job |
| What is the role of an incident response team | To handle and resolve cybersecurity incidents effectively and minimize damage |
Front
What does Integrity in the CIA Triad ensure
Click the card to flip
Back
Ensures data is accurate and unaltered by unauthorized users
Front
What is the principle of least privilege
Back
Limiting user access rights to only what is required to perform their job
Front
What is ransomware
Back
Malware designed to encrypt files and demand payment for the decryption key
Front
What is phishing
Back
A type of cyber attack involving fraudulent emails to trick individuals into revealing sensitive information
Front
What is a VPN used for
Back
Establishing secure, encrypted connections over potentially insecure networks
Front
What is the CIA Triad
Back
Confidentiality, Integrity, Availability
Front
What is a firewall
Back
A network security device that monitors and blocks or permits traffic based on predefined rules
Front
What does Availability in the CIA Triad uphold
Back
Ensures system and data access are operational when needed
Front
What does encryption do
Back
Converts data into a coded format to protect it from unauthorized access
Front
What is the role of an incident response team
Back
To handle and resolve cybersecurity incidents effectively and minimize damage
Front
What is social engineering
Back
Manipulating individuals to gain sensitive information or access through psychological tricks
Front
What is malware
Back
A type of malicious software intended to disrupt or gain unauthorized access to systems
Front
What is a zero-day vulnerability
Back
A software vulnerability discovered before a fix or patch has been released
Front
What is multi-factor authentication (MFA)
Back
A security measure requiring two or more verification methods to access resources
Front
What does Confidentiality in the CIA Triad mean
Back
Protecting sensitive information from unauthorized access
1/15
This deck covers foundational cybersecurity concepts, including key terms, principles, and roles relevant to the ISC2 Certified in Cybersecurity exam.