Cards (27)

  • What is the primary purpose of cybersecurity?
    Protect systems from attacks
  • What is malware designed to do?
    Harm or disrupt systems
  • Using strong passwords is a preventive measure against cybersecurity threats.

    True
  • Being cautious of suspicious emails is a preventive measure against phishing attacks.

    True
  • What three types of characters should be included in a strong password?
    Letters, numbers, and symbols
  • What is the purpose of encryption in cybersecurity?
    Protect sensitive information
  • Which physical security measure corresponds to firewalls in cybersecurity?
    Alarms and security guards
  • What does a VPN do in cybersecurity?
    Secure encrypted connection
  • What type of information does HIPAA protect in the United States?
    Sensitive health information
  • Match the cybersecurity legislation/policy with its description:
    GDPR ↔️ Regulates the collection of personal data
    HIPAA ↔️ Protects patient health information
    CMMC ↔️ Sets cybersecurity standards for defense contractors
    NIST Cybersecurity Framework ↔️ Provides guidelines for managing risk
  • Cybersecurity measures include firewalls, encryption, and access controls
  • What does DDoS stand for?
    Distributed Denial-of-Service
  • What does encryption convert data into?
    Secret code
  • Order the key cybersecurity practices for safeguarding digital assets:
    1️⃣ Use strong passwords
    2️⃣ Keep software updated
    3️⃣ Implement firewalls
    4️⃣ Encrypt data
    5️⃣ Restrict access privileges
  • Firewalls act as a barrier between a computer and the internet.

    True
  • Match the cybersecurity practice with its physical security equivalent:
    Strong passwords ↔️ Locks and keys
    Software updates ↔️ Regular maintenance
  • Antivirus software detects and prevents malicious software like viruses, worms, and trojans
  • The General Data Protection Regulation (GDPR) is a European Union law that regulates the collection and processing of personal data.
  • The NIST Cybersecurity Framework provides guidelines for managing cybersecurity risk.

    True
  • Cybersecurity protects digital assets, while physical security protects physical assets.

    True
  • Phishing involves deceptive attempts to obtain sensitive information
  • Firewalls protect networks from unauthorized access
  • Strong passwords use a combination of letters, numbers, and symbols
  • Keeping software updated helps patch vulnerabilities that could be exploited by cybercriminals
  • Access control limits user privileges to only the functions they need
  • Arrange the following cybersecurity tools based on their primary purpose:
    1️⃣ Firewalls (Monitor and control network traffic)
    2️⃣ Antivirus/Anti-malware Software (Detect and remove malicious software)
    3️⃣ Encryption (Convert data into secret code)
    4️⃣ Virtual Private Networks (VPNs) (Establish secure connection)
    5️⃣ Intrusion Detection/Prevention Systems (Detect malicious activity)
    6️⃣ Security Information and Event Management (SIEM) (Analyze security data)
  • Cybersecurity legislation and policies ensure the security and privacy of digital information.

    True