Review of Cybersecurity

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:07 PM on 8/26/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

12 Terms

1
New cards

What is Hacking?

Hacking is the act of exploring, modifying, or exploiting computer systems, networks, or applications.

2
New cards

What is the primary goal of hacking?

The primary goal of hacking is to gain unauthorized access to information or services.

3
New cards

What distinguishes a Red Team from a Blue Team in cybersecurity?

A Red Team simulates attackers to find vulnerabilities, while a Blue Team protects systems against attacks.

4
New cards

What is the function of a Purple Team?

A Purple Team collaborates the efforts of Red and Blue Teams for better security practices.

5
New cards

Define Vulnerability in the context of cybersecurity.

A vulnerability is a weakness in a system that presents risks but is not inherently bad.

6
New cards

What is an Exploit?

An exploit is when someone actively takes advantage of a vulnerability.

7
New cards

What is Enumeration?

Enumeration is the systematic discovery of devices and configurations, often a first step in penetration testing.

8
New cards

What is Social Engineering?

Social Engineering involves hacking people instead of technology, usually through deception.

9
New cards

List two examples of Social Engineering techniques.

Phishing and impersonation.

10
New cards

What is Malware?

Malware is malicious software designed to disrupt, damage, or steal data.

11
New cards

What do Monitoring Tools do?

Monitoring tools observe networks, systems, and applications for unusual activity.

12
New cards

What type of information can Monitoring Tools provide?

They can provide logs, reports, and alerts related to network and application activities.