mod 15 chaopter 8 Flashcards

(35 cards)

1
Q

Q: What is information theft?

A

A: Breaking into a computer to obtain confidential data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q: Give one example of data manipulation.

A

A: Changing the price of an item in a record system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q: What is identity theft?

A

A: Stealing personal information to impersonate someone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q: What is a disruption of service?

A

A: Preventing legitimate users from accessing services (e.g. DoS attacks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q: What is the difference between internal and external threats?

A

A: Internal threats come from users inside the organization; external threats come from outside.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q: What is social engineering?

A

A: Deceiving people to reveal confidential info or perform certain actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q: What is pretexting?

A

A: Creating a fake scenario to get the victim to share info, often via phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q: What is phishing?

A

A: Pretending to be a legitimate source via email or text to steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q: What is vishing?

A

A: Using voice messages to trick users into calling and revealing info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q: What is malware?

A

A: Malicious software like viruses, worms, and Trojans that harm systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q: How does a virus spread?

A

A: By attaching to files or programs and requiring user activation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q: What is a worm?

A

A: Malware that spreads on its own through a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q: What is a Trojan horse?

A

A: Malware disguised as legitimate software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q: What is spyware?

A

A: Software that secretly collects user information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q: Are cookies always harmful?

A

A: No, some cookies help personalize user experiences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q: What is adware?

A

A: Software that collects user data for advertising purposes.

17
Q

Q: What are popups and pop-unders?

A

A: Advertising windows that appear in front or behind browser windows.

18
Q

Q: What is a botnet?

A

A: A network of infected computers controlled by a hacker.

19
Q

Q: What is the goal of a DoS attack?

A

A: To prevent legitimate users from accessing a service.

20
Q

Q: What does a SYN flood do?

A

A: Sends fake connection requests to overload a server.

21
Q

Q: What is a ping of death?

A

A: Sending oversized packets to crash a system.

22
Q

Q: What is a DDoS attack?

A

A: A large-scale DoS attack using multiple infected devices.

23
Q

Q: How does brute force relate to DoS?

A

A: It can cause DoS by flooding login attempts or locking accounts.

24
Q

Q: Why should default usernames be changed?

A

A: They are commonly known and can be exploited by attackers.

25
Q: What is a patch?
A: Code that fixes a specific software vulnerability.
26
Q: What is a service pack?
A: A collection of patches and updates.
27
Q: Why is it important to update software regularly?
A: To fix vulnerabilities and prevent attacks.
28
Q: Name two signs of malware infection.
A: Slow computer performance and unresponsive programs.
29
Q: What does antivirus software do?
A: Detects, prevents, and removes malware.
30
Q: What are virus signatures?
A: Patterns used by antivirus software to detect viruses.
31
Q: What is resident dynamic scanning?
A: Checks files and programs as they are accessed.
32
Q: What is antispam software?
A: Identifies and filters out unwanted or suspicious emails.
33
Q: What does antispyware software do?
A: Detects and removes spyware and adware.
34
Q: What is a popup blocker?
A: Software that prevents unwanted advertising windows from opening.
35
Q: Why should you not forward suspicious emails?
A: They might spread malware or hoaxes.