Cyber Security Flashcards

1
Q

What are the techniques to making a strong password?

A

Use random numbers and symbols and make it something that isnt very personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are black hat hackers?

A

Hackers who break into computer systems for only unethical purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Grey hat hackers?

A

Hackers who break into computer systems for both ethical and unethical purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are white hat hackers?

A

Hackers who break in to computer systems for only ethical purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you find out information about an image?

A

Running a reverse google search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is steganography?

A

It is the practise of hiding a secret message inside of something that is not a secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are ciphers?

A

Secret messages or patterns hidden in something that looks normal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is EXIF data?

A

It is when a modern phone or camera catches an image it also catches the location and when it was taken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the importance of software updates, patches, and anti-virus software?

A

If the option for an update has came up it means that a weak spot has been found in the software, which could give hackers access to your accounts or details, which is why its important to constantly update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A

When you see unofficial numbers claiming to be someone else asking for credit card details, account details, or your address/postcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a firewall?

A

a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly