Basics of Cybersecurity
Types of Cyber Threats
Cybersecurity Tools
Cybersecurity Practices
100

What is cybersecurity?

The practice of protecting systems, networks, and programs from digital attacks.

100

What is malware?

Malicious software designed to damage or disrupt systems.

100

What is antivirus software used for?

Detecting and removing malware.

100

What is the principle of least privilege?

Granting users only the permissions they need to perform their job functions.

200

Why is cybersecurity important?

It protects sensitive data, ensures data integrity and availability, prevents financial losses, and maintains public trust in technology.

200

What is phishing?

Deceptive attempts to obtain sensitive information through emails, fake websites, or messages.

200

What does a firewall do?

Monitors and controls incoming and outgoing network traffic.

200

Why is multi-factor authentication important?

It adds an extra layer of security by requiring multiple forms of verification.

300

Name two key components of cybersecurity.

Protecting data and ensuring privacy.

300

What is social engineering?

Manipulating people into divulging confidential information.

300

What is Wireshark used for?

Monitoring network traffic and troubleshooting network issues.

300

What is network segmentation?

Dividing a network into smaller parts to improve security and manageability.

400

What can be compromised in a cyber attack?

Personal data, financial information, intellectual property, and operational systems.

400

Name three types of malware.

Viruses, worms, ransomware.

400

What is Nmap used for?

Discovering hosts and services on a network and for security auditing.

400

What is an intrusion detection system (IDS)?

A system that monitors network traffic for suspicious activity and potential threats.

500

What are the three pillars of cybersecurity?

Confidentiality, Integrity, and Availability (CIA triad).

500

What is ransomware and how does it typically spread?

Ransomware is a type of malware that encrypts files and demands a ransom for their release. It typically spreads through phishing emails and malicious downloads.

500

Name a tool used for encryption.

Tools such as PGP (Pretty Good Privacy) or GnuPG (GNU Privacy Guard).

500

What is the purpose of a security policy?

To establish guidelines and rules for protecting an organization's assets and information.

M
e
n
u