Cyberscurity Awareness Flashcards

1
Q

How secure the IPO of data

A

Cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How secure connections are

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Focuses on keeping software devices free of threats

A

Application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protects the integrity and privacy of data both in storage and transit

A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Processes and decisions for handling and protecting data assets

A

Operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define how an organization responds to s cyber security incident

A

Disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Addresses the most unpredictable cyber security factor

A

End user education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA triad where who is concerned should be the only one with access

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA triad where maintaining the accuracy consistency and trustworthiness of data

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA triad where authorized individuals are able to access data wherever they are

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network security device that monitors incoming and outgoing network traffic and decides whether to allow or block it

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Person who breaks into computer system

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anything that can compromise confidentiality, integrity of an information system

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any weakness in the IT Infrastructure that hackers can exploit

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer codes that perform malicious attacks

A

Virus

17
Q

Doesnt need a host

A

Worms

18
Q

Computer programs that hide their true nature and reveal their designed behavior only when activated

A

Trojan horse

19
Q

Sending fake emails that appear to come from a trustworthy source

A

Phishing

20
Q

Encrypts a victims files and demands ransom payment

A

Ransomware

21
Q

Overload a website service with traffic, making it inaccessible

A

Distributed denial of service attacks

22
Q

Eavesdropping attack

A

Man in the middle attack

23
Q

Intruders sneak into a system and remain undetected for a long period of time

A

Advanced persistent threats

24
Q

Processes and tools designed and deployed to protect sensitive business info

A

Information security