Drill #1, #2 Flashcards

1
Q

Human Firewall

A

With our information systems under aggressive attack, we cannot ignore any layer of the defense-in-depth model. The human element of cyber security is too often overlooked. Workforce cyber preparedness is urgently needed. Security Awareness Training can pay off by training users on what they can do to prevent malicious activity and what to do in the event of such activity. It helps people to see their identity as an important part of keeping their organization secure and that what they do matters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

KMSAT

A

(Kevin Mitnick Security Awareness Training) is KnowBe4’s signature product. It provides security awareness training and simulated phishing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

KCM

A

Organization tool for risk and compliance related projects. Separate product that helps a business get and stay in compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PhishER

A

is the newest KnowBe4 product. It is designed to prioritize and analyze the messages that users report as potentially malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does KnowBe4 do?

A

We manage the ongoing problem of social engineering, not a solution..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Motto

A

Do it right the first time, do it fast, and have fun while you do it!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Applications (apps):

A

A type of software that allows a user to perform specific tasks and activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

utilities

A

Applications designed to help analyze, configure, optimize, or maintain a computer. Unlike application software (which focuses on benefiting the user), utilities are used to support the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

operating system (OS):

A

Software that manages the computer hardware and software. It’s a system that sits between the applications and hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

platform:

A

The environment in which a piece of software is executed. It may be the hardware, operating system, a web browser, or other underlying software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

feature

A

Particular part of software or hardware that handles a specific piece of functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

plugin

A

A component that adds a specific feature to software. Also referred to as an extension.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software as a service (SaaS):

A

Software licensed on a subscription basis. The software is stored centrally on a server. It’s sometimes referred to as “on-demand software.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

API (application program interface):

A

A set of methods of communication between software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

console

A

A user interface that manages and controls software and/or hardware.
KnowBe4 customers access our products through a console (shown below).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

dashboard

A

At-a-glance views of key info, relevant to a particular business objective. Displayed as charts and/or other graphical images.

17
Q

server

A

system that manages access to centralized resources or data

18
Q

domain

A

Short for “domain name,” a unique name that identifies a website.

19
Q

directory

A

Like physical folders, a directory organizes files or data on a hard drive or in a program. Directories can contain other directories, which are then called sub-directories.

20
Q

AD (Active Directory):

A

A directory service (definition 2 above), developed by Microsoft for use on Windows operating systems.

21
Q

protocol

A

communication rules between computers.

22
Q

Hypertext Transfer Protocol (HTTP):

A

protocol used to transfer information over the Internet.

23
Q

Hypertext Transfer Protocol Secure (HTTPS):

A

The same as HTTP but secure. Secures the data by changing it to special code that requires special translation.

24
Q

white paper

A

mix of a marketing and technical document for a product

25
Q

whitelist

A

A list of trusted email address, domains and/or internet addresses that are permitted to pass through a system or filter.

26
Q

Hackers

A

The bad guys are those who either attempt to or succeed in breaking into networks and/or computers for the purpose of carrying out criminal activities.”

27
Q

Phishing is…

A

masquerading as a trustworthy entity attempting to acquire sensitive information

28
Q

spear phishing

A

targeted phishing attack on a specific person or organization with a specific personalized component

29
Q

phishing attack surface:

A

The quantity of emails exposed on the internet. The more email addresses exposed, the bigger the attack footprint is and the higher the risk for phishing attacks.

30
Q

Phish-prone Percentage:

A

A term coined by KnowBe4 that indicates the percentage of employees that are prone to click on phishing links. The customer starts with a baseline (a starting point used for comparison) percentage, which is the percentage of users who click on phishing links before being trained. Once trained, the test is done again 12 months later, to see the improvement.

31
Q

social engineering:

A

The act of manipulating people into performing actions or divulging confidential information.

32
Q

CEO fraud:

A

A spear phishing attack in which the hacker claims to be the CEO, that targets high-risk users— and urges an employee to do something unauthorized

33
Q

vishing (voice phishing):

A

A phishing attack conducted by telephone. Vishing is the phone equivalent of a phishing attack.

34
Q

smishing

A

Phishing conducted via Short Message Service (SMS), a telephone-based text messaging service.

35
Q

email spoofing:

A

Spoofing (tricking or deceiving) computer systems or other computer users. Email spoofing involves sending messages from a bogus email address or faking the email address of another user. It’s a tactic used in phishing because people are more likely to open an email when they think it has been sent by a legitimate source.