1. What is cybersecurity? Cybersecurity is the practice of protecting systems,
networks, programs, and data from digital attacks, unauthorized access, and
damage.
2. What are the three pillars of the CIA triad? Confidentiality, Integrity, and
Availability.
3. What does confidentiality mean in cybersecurity? Confidentiality ensures
that sensitive information is accessible only to authorized individuals and
protected from unauthorized disclosure.
4. What does integrity mean in the CIA triad? Integrity ensures that data
remains accurate, complete, and unaltered except by authorized parties.
5. What does availability mean in cybersecurity? Availability ensures that
systems, networks, and data are accessible and functional when needed by
authorized users.
6. What is the principle of least privilege? The principle of least privilege
means granting users only the minimum level of access necessary to perform
their job functions.
7. What is defense in depth? Defense in depth is a layered security approach
that uses multiple security controls to protect assets, so if one layer fails, others
provide protection.
8. What is the difference between a threat and a vulnerability? A threat is a
potential danger that could exploit a weakness, while a vulnerability is the
actual weakness or gap in security controls.
9. What is a security risk? Security risk is the potential for loss or harm when
a threat exploits a vulnerability, typically measured as likelihood times impact.
,10. What is the AAA framework in cybersecurity? AAA stands for
Authentication, Authorization, and Accounting - the three components of access
control.
11. What is multi-factor authentication (MFA)? MFA is a security process
requiring users to provide two or more verification factors to gain access to a
resource.
12. What are the three types of authentication factors? Something you know
(password), something you have (token/phone), and something you are
(biometric).
13. What is the principle of separation of duties? Separation of duties
requires that critical tasks be divided among multiple people to prevent fraud
and errors.
14. What is data classification? Data classification is the process of organizing
data into categories based on sensitivity, value, and criticality to the
organization.
15. What are common data classification levels? Public, Internal,
Confidential, and Restricted/Top Secret.
16. What is encryption? Encryption is the process of converting plaintext into
ciphertext using an algorithm to protect data confidentiality.
17. What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for encryption and decryption, while
asymmetric uses a public-private key pair.
18. What is a hash function? A hash function is a one-way mathematical
algorithm that converts input data into a fixed-size string of characters, used for
integrity verification.
19. What is a digital signature? A digital signature is a cryptographic
technique that provides authentication, non-repudiation, and integrity
verification of digital messages.
20. What is a firewall? A firewall is a network security device that monitors
and controls incoming and outgoing network traffic based on predetermined
security rules.
21. What is an Intrusion Detection System (IDS)? An IDS is a system that
monitors network traffic for suspicious activity and known threats, generating
alerts when detected.
, 22. What is an Intrusion Prevention System (IPS)? An IPS is similar to an
IDS but can automatically take action to block or prevent detected threats in
real-time.
23. What is the difference between IDS and IPS? IDS only detects and alerts
on threats, while IPS can actively block or prevent threats automatically.
24. What is a VPN? A Virtual Private Network creates an encrypted tunnel
over a public network to provide secure remote access and privacy.
25. What is two-factor authentication? Two-factor authentication requires
users to provide two different types of credentials to verify their identity.
26. What is social engineering? Social engineering is the manipulation of
people into divulging confidential information or performing actions that
compromise security.
27. What is phishing? Phishing is a social engineering attack where attackers
impersonate legitimate entities to trick victims into revealing sensitive
information.
28. What is malware? Malware is malicious software designed to damage,
disrupt, or gain unauthorized access to computer systems.
29. What is ransomware? Ransomware is malware that encrypts victim's data
and demands payment for the decryption key.
30. What is a zero-day vulnerability? A zero-day vulnerability is a security
flaw unknown to the software vendor and without an available patch.
Section 2: Risk Management (Questions 31-60)
31. What is risk management? Risk management is the systematic process of
identifying, assessing, and mitigating security risks to acceptable levels.
32. What are the four risk treatment options? Risk avoidance, risk
mitigation, risk transfer, and risk acceptance.
33. What is risk avoidance? Risk avoidance is eliminating the risk entirely by
not engaging in the activity that creates the risk.
34. What is risk mitigation? Risk mitigation is implementing controls to
reduce the likelihood or impact of a risk.
35. What is risk transfer? Risk transfer is shifting the risk to another party,
typically through insurance or outsourcing.
networks, programs, and data from digital attacks, unauthorized access, and
damage.
2. What are the three pillars of the CIA triad? Confidentiality, Integrity, and
Availability.
3. What does confidentiality mean in cybersecurity? Confidentiality ensures
that sensitive information is accessible only to authorized individuals and
protected from unauthorized disclosure.
4. What does integrity mean in the CIA triad? Integrity ensures that data
remains accurate, complete, and unaltered except by authorized parties.
5. What does availability mean in cybersecurity? Availability ensures that
systems, networks, and data are accessible and functional when needed by
authorized users.
6. What is the principle of least privilege? The principle of least privilege
means granting users only the minimum level of access necessary to perform
their job functions.
7. What is defense in depth? Defense in depth is a layered security approach
that uses multiple security controls to protect assets, so if one layer fails, others
provide protection.
8. What is the difference between a threat and a vulnerability? A threat is a
potential danger that could exploit a weakness, while a vulnerability is the
actual weakness or gap in security controls.
9. What is a security risk? Security risk is the potential for loss or harm when
a threat exploits a vulnerability, typically measured as likelihood times impact.
,10. What is the AAA framework in cybersecurity? AAA stands for
Authentication, Authorization, and Accounting - the three components of access
control.
11. What is multi-factor authentication (MFA)? MFA is a security process
requiring users to provide two or more verification factors to gain access to a
resource.
12. What are the three types of authentication factors? Something you know
(password), something you have (token/phone), and something you are
(biometric).
13. What is the principle of separation of duties? Separation of duties
requires that critical tasks be divided among multiple people to prevent fraud
and errors.
14. What is data classification? Data classification is the process of organizing
data into categories based on sensitivity, value, and criticality to the
organization.
15. What are common data classification levels? Public, Internal,
Confidential, and Restricted/Top Secret.
16. What is encryption? Encryption is the process of converting plaintext into
ciphertext using an algorithm to protect data confidentiality.
17. What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for encryption and decryption, while
asymmetric uses a public-private key pair.
18. What is a hash function? A hash function is a one-way mathematical
algorithm that converts input data into a fixed-size string of characters, used for
integrity verification.
19. What is a digital signature? A digital signature is a cryptographic
technique that provides authentication, non-repudiation, and integrity
verification of digital messages.
20. What is a firewall? A firewall is a network security device that monitors
and controls incoming and outgoing network traffic based on predetermined
security rules.
21. What is an Intrusion Detection System (IDS)? An IDS is a system that
monitors network traffic for suspicious activity and known threats, generating
alerts when detected.
, 22. What is an Intrusion Prevention System (IPS)? An IPS is similar to an
IDS but can automatically take action to block or prevent detected threats in
real-time.
23. What is the difference between IDS and IPS? IDS only detects and alerts
on threats, while IPS can actively block or prevent threats automatically.
24. What is a VPN? A Virtual Private Network creates an encrypted tunnel
over a public network to provide secure remote access and privacy.
25. What is two-factor authentication? Two-factor authentication requires
users to provide two different types of credentials to verify their identity.
26. What is social engineering? Social engineering is the manipulation of
people into divulging confidential information or performing actions that
compromise security.
27. What is phishing? Phishing is a social engineering attack where attackers
impersonate legitimate entities to trick victims into revealing sensitive
information.
28. What is malware? Malware is malicious software designed to damage,
disrupt, or gain unauthorized access to computer systems.
29. What is ransomware? Ransomware is malware that encrypts victim's data
and demands payment for the decryption key.
30. What is a zero-day vulnerability? A zero-day vulnerability is a security
flaw unknown to the software vendor and without an available patch.
Section 2: Risk Management (Questions 31-60)
31. What is risk management? Risk management is the systematic process of
identifying, assessing, and mitigating security risks to acceptable levels.
32. What are the four risk treatment options? Risk avoidance, risk
mitigation, risk transfer, and risk acceptance.
33. What is risk avoidance? Risk avoidance is eliminating the risk entirely by
not engaging in the activity that creates the risk.
34. What is risk mitigation? Risk mitigation is implementing controls to
reduce the likelihood or impact of a risk.
35. What is risk transfer? Risk transfer is shifting the risk to another party,
typically through insurance or outsourcing.