1.1 Cybersecurity Review

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

CTRL + ALT + DEL

Access Task Manager, lock computer, log out, or restart.

2
New cards

cd (change directory)

Moves you to a different folder in the terminal.

3
New cards

dir

Lists all files and folders in the current directory.

4
New cards

python script

Runs a Python script from the terminal (e.g., python example.py).

5
New cards

Safe and Appropriate (SA)

Posts that do not reveal personal info, are respectful, and follow rules.

6
New cards

Not Safe or Not Appropriate (NSA)

Posts that reveal sensitive info, are offensive, or break rules.

7
New cards

Spam

Unwanted bulk emails (ads, promotions).

8
New cards

Suspicious

Looks odd, unknown sender, maybe a trick.

9
New cards

Phishing

Attempts to steal sensitive info (passwords, bank info) via fake links or attachments.

10
New cards

Phisher

The person trying to trick you.

11
New cards

Authentication

Verifying someone’s identity.

12
New cards

Authorization

Permission to access resources.

13
New cards

Algorithm

Step-by-step instructions to solve a problem.

14
New cards

Passphrase

A long, secure password.

15
New cards

Encryption

Scrambling data so only authorized people can read it.

16
New cards

Crack

Breaking a password or encryption.

17
New cards

Spam

Unwanted or junk email.

18
New cards

Phishing

Fraudulent attempts to steal info.

19
New cards

Phisher

Person who does phishing.

20
New cards

Suspicious email

Email that looks unsafe or unusual.

21
New cards

File Extension

The part after a file name’s period that shows its type (e.g., .docx).

22
New cards

Code of Conduct

Rules for behavior online or in a company.

23
New cards

Top Level Domain (TLD)

The last part of a web address (e.g., .com, .edu).

24
New cards

Digital Footprint

Your online activity trail.

25
New cards

Social Media

Online platforms for communication and sharing.

26
New cards

CAPTCHA

Test to verify you are human.

27
New cards

Virtual Machine (VM)

Software emulating a computer inside another computer.

28
New cards

Cybersecurity

Protecting computers, networks, and data.

29
New cards

Email Source

The origin of an email, useful to check if it’s legitimate.

30
New cards

Identify

Know what you have and the risks.

31
New cards

Protect

Put safeguards in place to keep things safe.

32
New cards

Detect

Watch for threats or unusual activity.

33
New cards

Respond

Take action to stop or reduce damage from attacks.

34
New cards

Recover

Fix problems and get systems back to normal.