may 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:14 AM on 5/3/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

45 Terms

1
New cards

DES

is an old symmetric encryption algorithm that is no longer secure due to its weak key size.

2
New cards

3DES

is an older encryption algorithm that applies DES encryption three times to improve security, but it is now outdated.

3
New cards

AES

3DES is replaced by ______

4
New cards

802.1X

a network security system that requires login before you can access a network

5
New cards

AES

is a strong encryption standard/method used to secure data by converting it into unreadable form.

6
New cards

EFS

A Windows feature/tool that encrypts files

7
New cards

Attack Vector

is the path or method a hacker uses to get into a system

8
New cards

backdoor

is a hidden way or method that allows unauthorized access to a system without normal authentication.

9
New cards

Cisco Talos

is a cybersecurity research and threat intelligence team run by Cisco

10
New cards

Reconnaissance,

Weaponization,

Delivery,

Exploitation

what are the Cyber Kill Chains? (In-order)

11
New cards

Reconnaissance

A Cyber Kill Chain where the attacker gathers information about the target to find weaknesses

12
New cards

Weaponization

A Cyber Kill Chain where the attacker creates or prepares malware/exploit to use against the target

13
New cards

Delivery

A Cyber Kill Chain where the attacker sends the malware to the target system

14
New cards

Exploitation

A Cyber Kill Chain where the attacker uses a vulnerability to execute the attack on the system

15
New cards

CybOX

A standardized language for describing cyber observables—basically, things you can detect or measure in a system or network.

16
New cards

CybOX

lets security tools and analysts describe what was seen during an attack in a structured, machine-readable way.

17
New cards

DAT Files

virus definition files used by antivirus software

18
New cards

DFS

a system that lets you access files from multiple servers as if they are in one place

19
New cards

DHCP spoofing

Threat actors configure a fake DHCP server on the network to issue DHCP addresses to clients.

20
New cards

RAM → Fixed Disk(Hard Drive) → Archived Backup

In what order should you collect digital evidence?

21
New cards

Archived Backup

Which amongst them is the least Volatile?

  • Fixed Disk(Hard Drive)

  • Archived Backup

  • RAM

22
New cards

DMZ

Places public servers in a separate middle zone. Acts as a buffer between internet and private network

23
New cards

VLAN

Splits one network into multiple smaller networks

Example:

  • HR, Sales, IT separated

24
New cards

VPN

Encrypts your data, hides your real IP address and lets you connect to the internet safely

25
New cards

VPN

It creates a secure tunnel to connect to the internet safely

26
New cards

DNS

You type:

👉 You type:

```
google.com
```

👉 ______ converts it to:

```
142.250.xxx.xxx
```

👉 So your computer knows where to go

27
New cards

DNS Amplification

A type of DDoS attack where attackers use open DNS servers to flood a target with large amounts of traffic

28
New cards

EFS

a Windows feature that encrypts (locks) specific files

29
New cards

FireEye Helix

is a security tool/platform that detects, monitors, and helps respond to cyber threats.

30
New cards

HTTP Flooding

is a type of DDoS attack where attackers send a huge number of HTTP requests to a website

31
New cards

HTTP Flooding

1⃣ Attacker sends tons of requests like:

  • “Load homepage”

  • “Open page”

2⃣ Server tries to respond to all of them

3⃣ Server gets overwhelmed

👉 Real users can’t access the site

32
New cards

IP Spoofing

Faking the IP address in a packet to pretend to be another device

33
New cards

ARP Spoofing

💡 What it does

  • Tells devices:

    • “I am the router”

  • Victim sends data to attacker

💡 Example

👉 Attacker sits between:

  • Victim 💻

  • Router 🌐

👉 Intercepts traffic

34
New cards

IP,

ARP

_____ spoofing fakes identity on the internet, while _____ spoofing redirects traffic on a local network.

35
New cards

Keylogger

is a tool or malware that records everything you type on your keyboard

36
New cards

LDAP

its a system that’s like a login Directory Address Book

37
New cards

Sandboxing,

Integrity Checking,

Signature-Based,

Heuristics-based

list down the malware mitigation techniques

38
New cards

Sandboxing

malware mitigation technique: running a program in a safe, isolated environment. It’s like safe testing box

39
New cards

Integrity checking

malware mitigation technique: making sure data has not been altered by comparing it to its original state.

40
New cards

Signature-Based

malware mitigation technique: detecting malware by matching known patterns

41
New cards

Heuristic-based

malware mitigation technique: identifies malware by analyzing suspicious behavior/patterns rather than matching known signatures/patterns.

42
New cards

MD5

hashing algorithm used to create a fixed-length hash from data.

43
New cards

Metasploit

is a penetration testing tool used by security professionals to test if systems are vulnerable by trying to exploit them

44
New cards

NAC

is a security system that controls and verifies devices before allowing them to access a network. It’s like a security guard at the network door

45
New cards

Firewall

It controls what traffic is allowed through the network.