What does the acronym IP stand for in networking?
Internet Protocol
This type of software is designed to harm or exploit systems.
Malware
What is the main goal of ethical hacking?
To find and fix security vulnerabilities
This group is often targeted by phishing emails.
Employees or users
What is a password manager used for?
To store and manage secure passwords
Name one of the OSI model layers.
(Any of the 7: Physical, Data Link, Network, Transport, Session, Presentation, Application)
Name a common type of social engineering attack.
Phishing
True or False: Ethical hackers need permission before testing systems.
TRUE
What is the purpose of security awareness training?
To educate users about threats and safe practices
What does DLP stand for?
Data Loss Prevention
In a wireless network, this protocol helps secure communication (Hint: WPA3).
Wi-Fi Protected Access 3 (WPA3)
This attack involves intercepting data packets in a network.
Packet sniffing or sniffing attack
Which tool might an ethical hacker use to scan for open ports?
Nmap
What department handles access when an employee leaves the company?
Human Resources or IT Security
What’s the difference between authentication and authorization?
Authentication confirms identity; authorization grants access
What is the main function of a firewall?
To block unauthorized access while permitting outward communication
What does malware stand for, and give one example.
Malicious software; examples: virus, worm, Trojan
What is the difference between white hat and black hat hackers?
White hats are ethical/legal; black hats are criminal/illegal
What should happen when a user forgets a badge or device?
Report immediately and follow access control procedures
Describe an Access Control List (ACL)
A list that specifies which users or systems can access resources
Define the Information System Development Life Cycle (SDLC).
A process for planning, creating, testing, and deploying an information system
Describe a sniffing attack and how it can be prevented.
A sniffing attack captures network data; use encryption & secure protocols to prevent it
What is penetration testing, and why is it useful?
A simulated cyberattack used to test system security and resilience
What is the term for documenting how to respond to a data breach?
Incident Response Plan
What is the purpose of role-based access control?
To assign access rights based on job roles or responsibilities