cybersecurity Flashcards

(26 cards)

1
Q

What is the Internet?

A

A worldwide collection of interconnected networks and devices that uses transmission protocols such as TCP and IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the World Wide Web (WWW)?

A

A collection of webpages and other information on websites that uses HTTP(S) protocols written in HTML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are URLs?

A

Uniform Resource Locators are used to locate and access web pages. The typical format is protocol://website address/path/file name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does HTTP stand for?

A

Hypertext Transfer Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does HTTPS stand for?

A

Hypertext Transfer Protocol Secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a web browser?

A

Software used to connect to the internet, translating HTML code and ensuring SSL & TLS security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are cookies?

A

Small files stored on the user’s computer to track data and autofill forms.

Types of cookies include Session Cookies and Persistent Cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is digital currency?

A

A form of payment to pay for goods and services, including Debit/Credit Cards and Apps like Paypal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cryptocurrency?

A

A digital currency that uses cryptography to maintain transaction security and operates on a Blockchain Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Blockchain Network?

A

A system of interconnected computers where transaction data is stored, making hacking nearly impossible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a brute force attack?

A

An attempt by hackers to guess passwords by trying all possible combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data interception?

A

Stealing data by tapping into a wired or wireless transmission line.

Examples include Wardriving and Packet Sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a DDoS attack?

A

An attempt to prevent users from accessing part of a network, usually temporary but potentially damaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is hacking?

A

The act of gaining illegal access to a computer system, leading to identity theft and data corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware?

A

Malicious software that includes viruses, ransomware, adware, Trojan horses, spyware, and worms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is phishing?

A

A method where attackers send legitimate-looking emails to bait users into giving out their information.

17
Q

What is pharming?

A

A technique where attackers install malicious code to redirect users to fake websites.

18
Q

What is social engineering?

A

A tactic where attackers create social situations to trick victims into revealing personal information.

19
Q

What are access levels?

A

Different levels of access for different people to protect sensitive information.

20
Q

What is antivirus software?

A

Software that protects a user’s computer from malware attacks.

21
Q

What are biometric methods?

A

Authentication methods based on unique biological traits.

Examples include fingerprint scans, retina scans, and voice recognition.

22
Q

What is two-step verification?

A

A security process that requires two methods of authentication to verify a user’s identity.

23
Q

What are firewalls?

A

Hardware or software that monitors traffic between a network and a user’s computer.

24
Q

What are proxy servers?

A

Intermediate servers that filter internet traffic and keep the user’s IP address confidential.

25
What are privacy settings?
Settings used to limit who can access and see a user’s profile.
26
What is SSL?
Secure Socket Layer, a set of rules for secure communication over the internet.