Cybersecurity Double Test Flashcards

1
Q

What does the CIA Triad stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does IAM stand for?

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Keylogger

A

Tracks and records a user’s every keystroke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rainbow Table

A

Precomputed table of outputs of hash algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing

A

A way to encrypt; Can’t get output from input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a virtual machine?

A

A software emulation of a physical computer.
Ex: running Linux on windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ITE

A

Isolated Testing Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two types of UI

A

GUI and CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GUI

A

Graphical User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CLI

A

Command Line Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why CLI?

A

More efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is training employees to not make cyber errors?

A

Mitigating the Human Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSINT

A

Open Source Intelligence (ex. social media)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is identifying potential threats and analyzing risks?

A

Threat Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encoding

A

Makes digital data understandable to humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encrypting

A

Used to make data secure, incoherent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What method cracks ciphers with no prior knowledge?

A

Frequency Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many possible shifts in Caesar Cipher?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is concealing info within a text or image?

A

Steganography

20
Q

Examples of Steganography?

A

Backward messaging, Revolution letter technique, unusual pattern within image

21
Q

How is the system secured?

A

Through system hardening

22
Q

Additional input added into a hash function, adds complexity

A

Salt

23
Q

Assuring data is only accessible to authorized individuals

A

Confidentiality

24
Q

Ensuring the accuracy of data

A

Reliability

25
Q

Guarantees data is available when needed

A

Availability

26
Q

Attack that uses the same password on multiple accounts

A

Password Spraying

26
Q

Attack that utilizes personal/credential data of someone

A

Credential stuffing

27
Q

Breach where an employee releases data

A

Insider Leak

28
Q

Data breach through negligence

A

Unintended disclosure

29
Q

Principle of least Priviledge

A

Giving people absolute minimum digital power they need to do their job

30
Q

Used to verify integrity of data

A

Hashes

31
Q

Fabricated scenarios to scam

A

Pretexting

32
Q

Offering enticing items to scam

A

Baiting

33
Q

Sensitive info for sensitive info scam

A

Quid Pro Quo

34
Q

When you specifically are the target

A

Spear-phishing

35
Q

Website impersonation phish

A

SEO Trojans

36
Q

Redirect scams

A

Pop-up phishes

37
Q

Phishing through text

A

Smishing

38
Q

Phishing through voice call

A

Vishing

39
Q

Attack where someone reads all traffic while on wi-fi

A

Man In The Middle

40
Q

Hijack of DNS attack

A

Pharming

41
Q

Spamming ips attack

A

Snowshoeing

42
Q

Used to mitigate human factor

A

Zero trust strategy

43
Q

Assigns numbers (evaluated from binary) to English characters

A

ASCII

44
Q

Is hashing reversible?

A

nein