Cyber Security Flashcards

1
Q

What does CIA stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define confidentiality

A

Data is accessed by only those with the right permit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Integrity

A

Data is not tampered or altered in anyway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define availability

A

data and resources are able to be accessed and shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does DAD stand for?

A

Disclosure, Alteration, Deniability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define disclosure

A

data is accessed by non-authorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define alteration

A

Data has been compromised or tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define deniability

A

access to data and resources are blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define blacklist

A

a list of banned IP addresses, applications, or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define whitelist

A

a list of allowed IP addresses, applications, or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define cat fishing

A

the process of creating a fake online profile in order to trick people into believing they are someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define zero day?

A

A threat that is unknown to security specialists and has not been addressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define hack value

A

describes a target that may attract an above average level of attention from an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define non-repudiation

A

once an action is carried out by a party, it cannot be denied by that same party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define logic bomb

A

Malicious code that is only triggered when a set of conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define obfuscation

A

the tactic of making code unclear so that humans or programs like an antivirus cannot understand it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define honey pot

A

a decoy or trap for hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define spoof

A

the act of falsifying the indentity of the source of a communication or interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a protocol?

A

a set of rules that determine how computers communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does HTTP stand for?

A

Hyper Text Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Is HTTP stateless or stateful?

A

stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is SSL?

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is SSH?

A

Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is FTP?

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is SFTP?

A

Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is IMAP?

A

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is SMTP?

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a cookie?

A

Pieces of text of stored by a web server on your had disk

29
Q

What are cookies used for?

A

identify a user, check for their past activity on the website and use this record to provide the most relevant information to the user

30
Q

What is TCP?

A

Transmission Control Protocol divides a message or file into packets that transmitted over the internet more efficiently

31
Q

What is IP?

A

Internet Protocol is responsible for the address of each packet so it is sent to the correct destination

32
Q

What are the 4 layers of TCP/IP?

A

Datalink Layer, internet/networking layer, Transport layer, application layer

33
Q

What is the datalink layer of TCP/IP?

A

consists of protocols that operate on a link that connects hosts on a network e.g. ethernet

34
Q

Internet/Networking layer

A

connects independent networks together e.g. IP

35
Q

Transport Layer

A

handles communication between hosts e.g. TCP

36
Q

Application Layer

A

standardizes data exchange for applications e.g. HTTP, FTP

37
Q

What are the 5 main Social Engineering Tactics?

A

Baiting, Pretexting, Quid Pro Quo, Phishing, Vishing

38
Q

What is a brute force attack?

A

A trial and error attack against passwords

39
Q

What is a dictionary attack?

A

A type of brute force attack that goes through all the words of a dictionary

40
Q

What is phishing?

A

An email that contains a malicious link or file

41
Q

What is a spear phishing attack?

A

a phishing attack directed a specific individual

42
Q

What is vishing?

A

Phishing attack with a phone call

43
Q

What is smishing?

A

Phishing over text

44
Q

True or False: Botnets are very often used in DDoS attacks

A

True

45
Q

What are the three ways to prevent DDoS attacks from taking down your server?

A

Overprovision bandwidth, Creating a DDoS playbook, outsourcing protection to DDoS specialist

46
Q

What is the Man in the Middle Attack?

A

An attack where the attacker intercepts and potentially alters messages between computers

47
Q

What is a SQL Injection attack?

A

An attack where the attacker sends a malicious SQL statement to gain access to a database

48
Q

What is a XSS attack?

A

A cross site scripting attack is when a attacker sends malicious scripts of code into a website or website application. When a visitor comes to the website, their computer is infected

49
Q

What is a supply chain attack?

A

When hackers get into company A by getting into Company B’s network (where company B has access to company B)

50
Q

What is the server that is used to issue commands to bots in a botnet?

A

command and control server

51
Q

What are viruses/worms?

A

Malicious code written to alter the way a computer or a network operates

52
Q

True or False: A virus requires an active host program or already infected system to run

A

True

53
Q

is a worm or a virus self replicating and self propagating

A

a worm

54
Q

What is a trojan?

A

Powerful malware disguised as legitimate software

55
Q

What are the 4 types of Trojans?

A

backdoor trojans, infostealer trojan, trojan downloader, trojan DDoS

56
Q

What is Adware?

A

a program that displays unwanted banner advertisements

57
Q

What is spyware?

A

malware that monitors computer and internet use

58
Q

What is ransomware?

A

when a hacker encrypts a users data until the user pays the hacker to decrypt their data or threatens to release sensitive data unless a payment is received

59
Q

What is a firewall?

A

A security device that monitors incoming and outgoing network traffic

60
Q

What are the two types of firewalls?

A

hardware firewall and software firewall

61
Q

What are the two major types of encryption?

A

Symmetric and Asymmetric

62
Q

What is the difference between symmetric and asymmetric encryption?

A

symmetric uses the same key for encryption and decryption while asymmetric uses different keys

63
Q

What is an antivirus?

A

a software used to protect a computer from malware

64
Q

How does antivirus work?

A

identifies signatures of already identified malware or it runs the software in a sandbox and observes how it runs

65
Q

What are the main authentication factors

A

Knowledge factor (password), possession factor (keycard), inheritance factor (fingerprint)

66
Q

What is a DMZ?

A

A demilitarized zone is a physical or logical subnetwork that separates networks from other untrusted networks

67
Q

What is a security policy?

A

a written document that describes how an organizations protects it virtual and physical data assets

68
Q

What does BYOD stand for?

A

Bring your own device

69
Q

What is the weakest link in a companies security?

A

an employee