General Concepts Flashcards

(40 cards)

1
Q

IP Address

A

A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port

A

A communication endpoint on a computer or network device, used to identify a specific process or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet Sniffing

A

A method of monitoring and analyzing network traffic to detect and extract sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

A type of social engineering attack in which an attacker attempts to trick a victim into providing sensitive information, such as login credentials or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL Injection

A

A type of cyber attack in which an attacker injects malicious code into a website’s SQL database, allowing them to gain unauthorized access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Man-in-the-middle (MitM)

A

A type of cyber attack in which an attacker intercepts and alters communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS

A

A type of cyber attack in which an attacker uses a network of infected computers to flood a website or online service with traffic, causing it to become unavailable to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

Software specifically designed to harm or exploit a computer system, such as viruses, trojans, and ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit

A

A type of malware that is designed to conceal its presence on a system and provide an attacker with unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public Key Cryptography

A

A method of encrypting and decrypting data using a pair of mathematically-related keys, one of which is public and the other is private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSH

A

A secure network protocol used to remotely access and manage network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerability Scanning

A

The process of identifying potential vulnerabilities in a computer system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Engineering

A

A type of cyber attack in which an attacker uses psychological manipulation to trick a victim into providing sensitive information or performing a certain action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Botnet

A

A network of infected computers controlled by an attacker, used to launch DDoS attacks or other malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Keylogger

A

A type of malware that records every keystroke made on a computer, allowing an attacker to steal login credentials and other sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption

A

The process of converting plaintext into ciphertext, making it unreadable to anyone without the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Firewall

A

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

18
Q

Two-Factor Authentication

A

A method of confirming a user’s claimed identity by requiring them to present two or more pieces of evidence.

19
Q

Zero-Day Exploit

A

A type of cyber attack that takes advantage of a previously unknown vulnerability in a computer system or software.

20
Q

Advanced Persistent Threat (APT)

A

A type of cyber attack in which an attacker establishes a long-term presence on a target’s network with the goal of stealing sensitive information or causing damage over an extended period of time.

21
Q

Remote Access Trojan (RAT)

A

A type of malware that allows an attacker to remotely control an infected computer.

22
Q

Denial of Service (DoS)

A

A type of cyber attack that aims to make a computer resource unavailable to its intended users by overwhelming it with traffic.

23
Q

Cross-Site Scripting (XSS)

A

A type of cyber attack that injects malicious code into a website, allowing an attacker to steal sensitive information from users.

24
Q

Cross-Site Request Forgery (CSRF)

A

A type of cyber attack that tricks a user into performing an action on a website without their knowledge or consent.

25
File Inclusion Vulnerability
A type of vulnerability that allows an attacker to include a file on a web server, potentially allowing them to execute malicious code.
26
Password Cracking
The process of attempting to gain unauthorized access to a computer system by guessing or cracking a user's password.
27
Email Spoofing
A type of cyber attack in which an attacker sends an email that appears to be from a legitimate sender in order to trick the recipient into providing sensitive information.
28
Network Mapping
The process of creating a visual representation of a network's structure and topology.
29
Distributed Denial of Service (DDoS)
A type of cyber attack that uses a network of infected computers to overwhelm a website or online service with traffic, making it unavailable to legitimate users.
30
Clickjacking
A type of cyber attack that tricks a user into clicking on a button or link that they did not intend to click on.
31
Advanced Encryption Standard (AES)
A widely-used standard for encrypting and decrypting data, known for its strong security and high performance.
32
Virtual Private Network (VPN)
A private network that uses a public network to securely connect remote users and devices.
33
Network Segmentation
The process of dividing a network into smaller, isolated segments in order to improve security and reduce the impact of a cyber attack.
34
Buffer Overflow
A type of cyber attack that exploits a vulnerability in a computer program by overflowing its buffer, allowing an attacker to execute malicious code.
35
Internet of Things (IoT)
The interconnection of everyday devices and appliances that are connected to the internet, allowing them to collect and share data.
36
Backdoor
A type of cyber attack that creates a hidden way for an attacker to gain unauthorized access to a computer system or network.
37
Exploit Kit
A collection of tools and techniques used to exploit vulnerabilities in computer systems and networks.
38
Root Access
The highest level of access to a computer system, allowing a user to perform any action on the system.
39
End-to-End Encryption
A method of encrypting data that ensures only the sender and the intended recipient can read the message, not even the service provider can access.
40
Advanced Persistent Threats (APT)
A type of cyber attack that establishes a long-term presence on a target's network with the goal of stealing sensitive information or causing damage over an extended