Professional Documents
Culture Documents
Cybersecurity Basics:
1.2. Explain the CIA triad (Confidentiality, Integrity, Availability) and its
significance in cybersecurity.
1.3. What are the main types of cyber threats, and can you provide examples of
each?
1.4. Describe the difference between a virus, worm, and Trojan horse.
2.1. Define risk assessment and risk management in the context of cybersecurity.
2.2. Explain the principle of least privilege and why it's essential.
2.3. What is data encryption, and how does it contribute to data security?
2.4. Describe the concept of access control and its role in information security.
3. Network Security:
3.2. Define VPN (Virtual Private Network) and its uses in securing network
communications.
3.3. Explain the purpose of intrusion detection systems (IDS) and intrusion
prevention systems (IPS).
4. Cybersecurity Technologies:
4.2. Describe the role of encryption in securing data at rest and in transit.
7. Incident Response:
7.1. What is an incident response plan, and why is it essential for organizations?
7.2. Describe the steps you would take to respond to a data breach.
7.4. What is the role of a Computer Security Incident Response Team (CSIRT)?
8.3. What is the principle of "defense in depth," and why is it crucial for
cybersecurity?
9.4. How does role-based access control (RBAC) work, and why is it important?
10. Cryptography:
10.1. What are encryption keys, and how are they used in cryptography?
18.1. Define social engineering and provide examples of common social engineering
attacks.
18.2. How can individuals and organizations protect themselves against social
engineering attacks?