Week 02 Foundations of Cybersecurity Flashcards
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.
A) Artificial neural network (ANN)
B) Artificial general intelligence (AGI)
C) Adversarial artificial intelligence (AI)
D) Artificial swarm intelligence (ASI)
Answer: C
A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage.
A) Business Email Encryption (BEE)
B) Business Email Compromise (BEC)
C) Business Email Verification (BEV)
D) Business Email Marketing (BEM)
Answer: B
Malicious code written to interfere with computer operations and cause damage to data and software
A) Computer worm
B) Computer trojan
C) Computer ransomware
D) Computer virus
Answer: D
An attack that affects secure forms of communication between a sender and intended recipient
A) Cryptographic attack
B) Cryptographic protocol
C) Cryptographic hash
D) Cryptographic key
Answer: A
Any person who uses computers to gain access to computer systems, networks, or data
A) Cracker
B) Hacker
C) Breaker
D) Maker
Answer: B
Software designed to harm devices or networks
A) Firmware
B) Shareware
C) Malware
D) Freeware
Answer: C
An attempt to access password secured devices, systems, networks, or data
A) Password cracking
B) Password attack
C) Password recovery
D) Password guessing
Answer: B
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
A) Fishing
B) Fission
C) Fusio
D) Phishing
Answer: D
A security incident that affects not only digital but also physical environments where the incident is deployed
A) Physical attack
B) Physical security
C) Physical layer
D) Physical access
Answer: A
An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location
A) Phishing Attack
B) Man-in-the-Middle Attack
C) Physical Social Engineering
D) Brute Force Attack
Answer: C
A manipulation technique that exploits human error to gain private information, access, or valuables
A) Social engineering toolkit (SET)
B) Social proof
C) Physical social engineering
D) Social network analysis (SNA)
Answer: A
A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack
A) Social media phishing
B) Social media analytics
C) Social media marketing
D) Social media management
Answer: A
A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source
A) Spear fishing
B) Spear throwing
C) Spear phishing
D) Spear hunting
Answer: C
An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed
A) Supply-chain management
B) Supply-chain optimization
C) Supply-chain integration
D) Supply-chain attack
Answer: D
An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network
A) USB charging
B) USB baiting
C) USB formatting
D) USB debugging
Answer: B