This term refers to the protection of computer systems from theft or damage.
What is cybersecurity?
This type of network filters traffic using a set of rules.
What is a firewall?
This type of encryption uses the same key for encryption and decryption.
What is symmetric encryption?
This most popular tool - commonly used for penetration testing.
What is Metasploit?
This common type of attack tricks users into revealing confidential information.
What is phishing?
It's the process of converting data into a cyphertext to prevent unauthorized access.
What is encryption?
A secure network protocol used for remote administration.
SSH
This asymmetric encryption algorithm is widely used for secure data transmission.
What is RSA (Rivest–Shamir–Adleman)?
A protocol used for secure communication over the internet. (web pages)
What is HTTPS?
A type of malware that locks files until payment is made.
What is ransomware?
The principle that ensures only authorized individuals can access information.
What is confidentiality?
A segment of a network designed to expose services while keeping internal networks secure.
What is a DMZ (Demilitarized Zone)?
A law that requires companies to protect customer data in the EU.
What is GDPR (General Data Protection Regulation)?
Software that detects and removes malicious programs.
What is antivirus software?
Attackers inject malicious scripts into websites in this attack.
What is cross-site scripting (XSS)?
The CIA triad stands for these three core principles.
What are confidentiality, integrity, and availability?
This attack floods a network with traffic to disrupt services.
What is a DDoS (Distributed Denial of Service) attack?
Encryption of data being stored
What is data-at-rest encryption?
This protocol ensures safe email transmission.
What is SMTP over TLS (or SMTPS)?
This attack targets users by mimicking a legitimate login page.
What is a phishing or spoofing attack?
Security+ Certificate Vendor
What is CompTIA
Protocol used to securely connect to a VPN.
What is IPsec (Internet Protocol Security)?
This algorithm replaced DES as a more secure encryption standard.
What is AES (Advanced Encryption Standard)?
This tool helps detect unusual activity on a network.
What is an IDS (Intrusion Detection System) or IPS (Intrusion Prevention System)?
"This social engineering technique involves an attacker calling and pretending to be IT support to extract login credentials."
What is vishing?