Week 1 Introduction Flashcards

1
Q

National institute of standards and Technology NIST

A

A us govt agency that provides technology focused guidelines. They specify which security measures should be in place to ensure data safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nice Framework

A

A national resource that assists employers in enhancing their cybersecurity workforce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port

A

A location from which network connections originate and terminate. OS handles these ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Terminal

A

A Linux text based interface that receives text-based commands as input and provides feed back in textual form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan Horse

A

A type of malware that disguises itself as a legitimate program and downloads onto a computer. Malicious code is concealed within legitimate software to gain access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability

A

A device, software, or human weakness involving a cyber asset that an attacker can exploit to perform malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wanna Cry

A

A type of ransomware that emerged May 12, 2017. It was a massive attack campaign that affected companies worldwide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

All measures taken to ensure data is available to authorized parties whenever needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA triad

A

A model intended to manage information security policies inside an organization. 3 components are confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Measures taken to ensure sensitive data is not exposed to unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A

Measures that must be taken to ensure data cannot be changed by unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kali Linux

A

An open source distribution of the Linux operating system designed for advanced penetration testing purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly