POST TEST Flashcards
(20 cards)
A broad category for techniques that aim to psychologically manipulate a person’s trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question.
Social Engineering
Software that is intended to do harm or damage.
Malware
Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
Phishing
The person sending the phishing attempts.
Whenever you receive an email, check whether it appears to be suspicious in any way
Phisher
Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.
Spam
Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network
Social Media
A system that can distinguish between a human and an automated program.
_ _ _ _ _ _ _s provide challenges that are difficult for computers to perform but relatively easy for humans.
CAPTCHA
The email address from which the email was sent.
email source
The last segment of a web address; it follows immediately after the last “dot” symbol (.com, .net, .org, .gov)
top-level domain
A lot of links appear in social media, emails, text messages, and other online media that could lead you to _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
suspicious websites
To confirm your identity using knowledge known only to you or information interpreted by you.
authenticate
To give permission, for example, in order to access information.
authorize
A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion.
password generator can create a strong, random passphrase for you
A password authorizes you to a service or other
encryption
A systematic attempt to crack a password testing with words and phrases found in online
dictionary attack
An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct.
brute force attack
The trail that you leave behind when you engage in online experiences.
digital footprint
The ability for someone to decode or figure out your password.
Do not use common passwords. Do not base passwords on personal information.
password cracking
Windows terminal software; we use it to send commands directly to windows.
Powershell
Triad - Confidentiality, Integrity, availability.
CIA
A virus that will encrypt your files and demand payment to unlock them.
RansomWare