Cybersecurityx Flashcards

1
Q

What techniques can you use to create a strong password

A

Various methods like using a combination of uppercase and lowercase letters, numbers, and special characters – not too short; avoiding common words or phrases; and using a passphrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Besides passwords, what are other ways to secure data or accounts?

A

Two-factor authentication (2FA), biometric authentication (e.g., fingerprint or facial recognition), encryption, regular data backups, and secure networking protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

: What are the differences between white hat, grey hat, and black hat hackers?

A

White hat hackers are ethical hackers who use their skills to help organizations by finding vulnerabilities before malicious hackers do. Grey hat hackers sometimes break the law but don’t have malicious intent. Black hat hackers engage in illegal activities for personal gain or to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

: How might hackers break the Computer Misuse Act?

A

: By gaining unauthorized access to computer systems, distributing malware or viruses, or engaging in activities that disrupt or damage computer systems or data without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you edit file extensions to disguise files?

A

By changing the file extension to a different file format, making it appear as a harmless file type while actually being a different, potentially malicious, type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you find information about an image by running a reverse Google search?

A

By uploading the image to Google Images or using the “Search by image” feature to find websites where the image appears and retrieve related information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can you learn by investigating file properties?

A

• Back: File properties can provide details such as the file’s creation date, last modified date, file type, size, and sometimes metadata about the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What information can you find in the EXIF data of images?

A

EXIF data can include details such as the camera model, shutter speed, aperture, ISO sensitivity, GPS coordinates, and timestamps of when the photo was taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• Front: How can steganography be used to find and hide data in files?

A

Steganography involves concealing data within another file, such as embedding text within an image or hiding files within seemingly innocuous files like audio or video files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can keys be used to decipher data?

A

Keys are used in encryption algorithms to encode and decode data. The same key used to encrypt data is needed to decrypt it, ensuring that only authorized parties can access the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are OS updates and software patches important?

A

OS updates and software patches often contain fixes for security vulnerabilities, ensuring that systems are protected against known threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of antivirus software in cybersecurity?

A

Antivirus software helps detect, prevent, and remove malware infections on computer systems by scanning files and monitoring system activity for suspicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly