Cyber Security Flashcards

1
Q

What is spyware?

A

Spyware gathers information on the computer user. People uses it to find bank details or moments on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what does spyware get from your phone?

A

location, voice recordings, access the microphone, take a screenshot and view web history.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Trojan Horse virus?

A

A program that masquerades as a legitimate software but is actually a virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens once you download a Trojan Horse?

A

The payload is released often without any noticeable effects. Then the virus will usually open a back door so the virus can send connections past the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can a Trojan Horse self-replicate?

A

NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the vulnerabilities of a computer to malware?

A
  • Switched of Firewall
  • not updated virus protection software
  • Admin rights failing
  • Cracks in software
  • human error
  • social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a macro

A

it is a set of instructions a computer follows so you don’t have to do them individually, it is used in excel. It is used in hacking as it follows a set of instructions without the user allowing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is encryption

A

Encryption is where you disguise a piece of data so that only people that know how to unencrypt it can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is blagging?

A

Blagging is the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A

Phishing is a technique of fraudulently obtaining private information, often using email or SMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Pharming?

A

Pharming is a cyber attack intended to redirect a website’s traffic to another, fake site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is shouldering?

A

Shouldering is observing a person’s private information over their shoulder eg cashpoint machine PIN numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is social engineering?

A

It is when you manipulate people so they give you personal information such as passwords and bank details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do hackers use social engineering?

A

Because it is easier to pretend to be trustworthy and to trick someone into giving you their personal data then to secretly hack it out of their computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does captcha stand for?

A

Completely Automated public turing test to tell computers and humans apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a white box Penetration test?

A

It is where give a tester a basic information This could include