AP Cyber Security Chapter Test Flashcards

1
Q

Cyber security

A

The practice of preventing, detecting, and responding to adversarial attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DDOS

A

Distributed Denial of Service

A malicious attack with the goal of disrupting a server, service, or network by overwhelming it with a flood of internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network Attack

A

Attempt to gain unauthorized access to a computer network system, or device with the intent of stealing, damaging, or manipulating data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preventing Cyber security Threats

A
  1. Strong Passwords
  2. 2 - factor authentication
  3. Update anti malware software
  4. Comply with security policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall

A

Security device designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS

A

Intrusion Detection System

Preventive tool, monitors networks for signs of any potential threats or weird activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Endpoint Security

A

Process of protecting your devices from Cyber security threats and attacks.

(Phone, Laptop, Tablet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Incident Response Plan

A

PTTIRP

Prep
Threat Identification
Threat Containment
Investigation
Recovery
Post-Incident-Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Data is only accessible by AUTHORIZED individuals, systems, or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A

Means that data is accurate and trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Availability

A

Data and services are accessible when REQUIRED/NEEDED by authorized individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Signs of Phishing

A
  1. Spelling Errors
  2. Unusual Requests
  3. Ask for personal details
    4 Suspicious Attachments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firmware

A

Controls how devices initialize, boot, and communicate with other hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an Operating System?

A

Manages system resources and performs essential system tasks like launching applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Operating System Functions

A
  1. Launches and manages applications
  2. Coordinates input/output devices
  3. Manages CPU, Memory, and Storage Resources
17
Q

What is Application Software

A

Software that performs specific tasks for the user

Ex. Internet browsers, Word processors, Music software

18
Q

What is a driver?

A

Software that allows a device to communicate with the computer’s operating system.

19
Q

Virtual Environments

A

Contains multiple virtual instances, virtual networks, and virtualized components

Stimulate entire data centers

20
Q

How Virtualization Improves Efficiency

A
  1. Pools hardware resources for better utilization
  2. Reduces the cost of physical hardware
21
Q

Security Benefits of Virtualization

A

Virtual instances are isolated from one another, enhancing security.

If one virtual machine is compromised, others on the same machine remain unaffected.

22
Q

What is a file system?

A

System for which files are named, stored, and organized on a computer system.

23
Q

Files

A

Data stored in a computer (documents, images, etc)

24
Q

Directories

A

Locations that can store multiple files and subdirectories (files)

25
Directory Tree
Hierarchical structure of directories and subdirectories
26
What is a network?
a system of computers that are able to communicate with each other. Gives computer users access to the same data, resources, and applications.
27
LAN
Local Area Network - is a group of connected computing devices within a localized area that usually share a centralized Internet connection.
28
WAN
Wide Area Network = Devices connected across a wide geographic area. Usually, a collection of connected LANS.
28
Hub
broadcast message
29
LAN connection devices
hub, switch, WAP
30
Switch
Connects multiple devices, such as computers, WAPs, printers, and servers on the same network within a building or campus. Sends the message only to the destination device in the LAN
31
Wireless Access Point
A switch without wires
32
Router
Sends the message only to the destination device in the LAN or in the WAN
33
Metropolitan Network
A private network an entity uses to communicate in a city or local area. Larger than a LAN but smaller than a WAN
34
SOHO
A type of LAN that serves a small number of devices and users, about 1-20, and typically a small business setting.
35
Personal Area Network
Connects devices that are the closest to the user. Typically through Bluetooth like headphones, keyboard, mouse.
36
Binary =
Base 2
37
Decimal =
Base 10
38
What does BIT mean?
Binary Digit