CYber systems Flashcards

cert (14 cards)

1
Q

Snooping

A

Attempting to secretively discover private information about a person, company, or other entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wiretapping

A

A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering

A

The use of deception to gain personal and/or private information for unlawful purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reconnaissance

A

The passive gathering of information about a potential victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pretexting

A

Tricking a victim into revealing sensitive information under false pretenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Email Attack

A

Exploiting a victim using email messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Browser Attack

A

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Man-in-the-Middle Attack

A

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Replay Attack

A

An attempt to connect to a server by capturing and resending authentication information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Impersonation

A

TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of Service

A

An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

Software designed to infiltrate or damage a computer system without the ownerโ€™s consent or knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password Attack

A

An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify Theft

A

An occurrence in which thieves steal other peopleโ€™s personal and financial information for their own personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly