Final Exam Flashcards

(60 cards)

1
Q

Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PII is any information specific to an individual.

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites).

A

Cyberbullies/cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Methods individuals use to track, lure, or harass another person online.

A

Cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Web sites on the worldwide web with hazard conditions to cyber safety.

A

Risk Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An electronic mail message sent from one computer or mobile device to another computer or mobile device.

A

Electronic mail (e-mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of protecting a system and network against unintended or malicious changes or deletion of information

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The study of ethics pertaining to computers, covering we use them how we use them; this can affect individuals and society.

A

Cyber Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The act of circumventing or breaking past security boundaries.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person who engages in hacking

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ethical and law-abiding

A

White-hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

operates outside the law

A

Black-hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The avenue or path hacker uses to commit the attack.

A

Attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A malicious software code that is unleashed and attempts to perform its destructive content.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A attempt to steal, damage, or destroy data or computer system.

A

Cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Confidentiality
Integrity
Availability
Are the three underlying principles of data protection.

A

CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The condition of being private or secret

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Having important information in the state of being complete or uncorrupted

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Having access to information when you need it is known as

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This term refers to the weakness of an Asset that can be Exploited by one or more attackers

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Any event that has the potential to bring harm to an organization or individual.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The potential or loss or damage when a threat exploits a vulnerability

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A computer code intentionally written to cause some form of harm.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication
Phishing
26
a third party trying to gain access to your systems by cracking a user’s password.
Password Attack
27
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to the Internet.
Denial-of-Service Attack (DDoS)
28
a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.
Ransomware
29
What do we do with Ransomware?
We don't pay because the hacker may not give you the info you need to get your file back and may try to force you to pay more money.
30
Name 1 – 2 types of a cyber attack?
DDOS, Virus, Phishing
31
This type of Password Attack has a third party trying to guess your password.
Brute Force Password Attack
32
Examples of Confidentiality attacks
Hacking Encrypted Data, Man in the middle attacks
33
Examples of Integrity attacks
Remotely controlling zombie system, Maliciously accessing servers and forging records
34
Examples of Availability attacks
DOS/DDoS Attacks, Flooding a server with too many requests
35
These two are a list common things you should NEVER do online.
share your password, Posting anything online that you do not want public
36
What are the three key Goals of Security Measures in Cyber Security?
Prevent ,Detect, and Recover from a problem.
37
Personal Skills used to communicate and work well with others is known as what?
Soft Skills
38
In a few words define what is Risk sites?
Web sites on the worldwide web with hazard conditions to cyber/online safety
39
True or False: The Purpose of Malware is found in its payload.
True
40
Keylogger
Technology that tracks a user's keystrokes on the keyboard
41
Social Engineering
To Trick Someone into doing actions or giving up confidential information to hackers/people.
42
Cookies
Small files saved on the computer for web browser and websites.
43
True or False: Trusted Sites Create Cookie Policy that States if the site uses them and how they are being used.
True
44
Trojan Horse
Malware hidden inside other Software that appears harmless.
45
True or False: Remote Access Trojan is a malware that allows the hacker to embed a backdoor to gain administrative control over someone computer.
False
46
Compliance
Following the rules or standards that has been established.
47
Computer Fraud and Abuse Act (CFAA)
Deals with unauthorized access of computers.
48
Electronic Communication and Privacy Act (ECPA)
Protects wire and electronic transmissions of data.
49
Sarbanes-Oxley Act (SOX)
Prevents company executives from hiding or destorying electronic records from a minimum of five years.
50
Gramm-Leach-Bliley Act (GLBA)
Ensures that financial businesses are protecting your private data.
51
Health Insurance Portability and Accounting Act (HIPAA)
Protects Electronic Medical Records and Personal Health Information.
52
Which of the following below are key sign to watch out for when dealing with Phishing. Select all that apply
Spoofed Email Address, All Caps, Asking your for your PII
53
What is the name of the Programing Language We use on replit.com?
Python
54
True or False: 50% of websites online are safe.
False No place is 100% safe online.
55
Dumpster Diving
One who goes digging through trash for useful information.
56
Encryption
Data protection technique that includes changing information from its original form to disguised or encoded format
57
Cipher
A tool used to change normal text into something that is unreadable and then turn back into readable text.
58
Plaintext
Refers to any text that can be read or written.
59
Ciphertext
Encoded message
60
Virtual Machine
Runs a Actual operating system of physical computer.