POST TEST Flashcards

(20 cards)

1
Q

A broad category for techniques that aim to psychologically manipulate a person’s trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software that is intended to do harm or damage.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The person sending the phishing attempts.
Whenever you receive an email, check whether it appears to be suspicious in any way

A

Phisher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system that can distinguish between a human and an automated program.
_ _ _ _ _ _ _s provide challenges that are difficult for computers to perform but relatively easy for humans.

A

CAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The email address from which the email was sent.

A

email source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The last segment of a web address; it follows immediately after the last “dot” symbol (.com, .net, .org, .gov)

A

top-level domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A lot of links appear in social media, emails, text messages, and other online media that could lead you to _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.

A

suspicious websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To confirm your identity using knowledge known only to you or information interpreted by you.

A

authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To give permission, for example, in order to access information.

A

authorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion.
password generator can create a strong, random passphrase for you
A password authorizes you to a service or other

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A systematic attempt to crack a password testing with words and phrases found in online

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct.

A

brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The trail that you leave behind when you engage in online experiences.

A

digital footprint

17
Q

The ability for someone to decode or figure out your password.
Do not use common passwords. Do not base passwords on personal information.

A

password cracking

18
Q

Windows terminal software; we use it to send commands directly to windows.

19
Q

Triad - Confidentiality, Integrity, availability.

20
Q

A virus that will encrypt your files and demand payment to unlock them.