INFOASEC cybersec1 Flashcards

(33 cards)

1
Q

(GIS)

A

Geospatial Information
Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

group of criminals breaks into computers or networks to
gain access for various reasons.

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

break into networks or computer
systems to discover weaknesses in order to improve the
security of these systems.

A

White hat attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

between white and black
hat attackers. The gray hat attackers may find a
vulnerability and report it to the owners of the system if
that action coincides with their agenda.

A

Gray hat attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unethical criminals who violate
computer and network security for personal gain, or for
malicious reasons, such as attacking networks.

A

Black hat attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Teenagers or hobbyists mostly limited to pranks
and vandalism, have little or no skill, often using existing tools
or instructions found on the Internet to launch attacks.

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Grey hat hackers who rally and protest against
different political and social ideas.

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

e black hat hackers who are either
self-employed or working for large cybercrime organizations

A

Cyber Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

, these are either white hat or black hat hackers
who steal government secrets, gather intelligence, and

A

State Sponsored Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CVE

A

Common Vulnerabilities
and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

displays real-time visualization of attacks.

A
  • Early Warning Systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a weakness that makes a target susceptible to
an attack

A
  • Cyber vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the possibility that a harmful event, such as
an attack, will occur

A

cybersecurity threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

recognize the threat that data poses if used
against people

A
  • Cybersecurity specialists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A tool to capture
data streams over a network.

A

packet-sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

interferes
with an established network communication by
constructing packets to appear as if they are part
of a communication.

A
  • Packet forgery
16
Q

(NSA)

A

National Security Agency

17
Q

the collection of
technologies that enable the connection of various
devices to the Internet.

18
Q

is the result of data sets that are large and
complex, making traditional data processing
applications inadequate.

19
Q

a continuous computer hack
that occurs under the radar against a specific object

A
  • Advanced persistent threat
20
Q

(APT)

A

Advanced persistent threat

21
Q

(TDoS)

A

telephone denial of service

22
Q

(NIST)

A

National Institute of Standards and
Technologies

23
Q

includes providing the
support, administration, and maintenance required
to ensure IT system performance and security

A

Operate and Maintain

24
includes the identification, analysis, and mitigation of threats to internal systems and networks
Protect and Defend
25
includes the investigation of cyber events and/or cyber crimes involving IT resources
* Investigate
26
includes specialized denial and deception operations and the collection of cybersecurity information
* Collect and Operate
27
includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence
Analyze
28
provides for leadership, management, and direction to conduct cybersecurity work effectively
Oversight and Development
29
is an intermediate-level certification asserts that cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
* EC-Council Certified Ethical Hacker
30
Cybersecurity specialists responsible for managing, developing and overseeing information security systems at the enterprise level or for those developing best security practices can qualify for CISM.
Certified Information Security Manager
31
The CCNA Security certification validates that a cybersecurity specialist has the knowledge and skills required to secure Cisco networks.
Cisco Certified Network Associate Security
32