1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Cryptography
The practice of writing and solving codes to secure communication.
16
The hexadecimal system is based on the number ____.
Analyst
A common career path in the field is a Cybersecurity ____.
Visited
A "Watering Hole" attack compromises a website that is known to be ____ by a target group.
Phishing
A technique used to obtain user credentials through deception via fake emails or websites.
Threats
The primary purpose of cybersecurity is to protect information and systems from digital ____.
cd
The Linux command used to change the current directory.
1
Binary code represents data using two states: 0 and ____.
Encrypt
Ransomware attacks are designed to ____ user data and demand payment.
Logic
A fundamental digital electronics building block is the ____ gate.
Integrity
Hashing ensures data ____ by converting it into a fixed-size string.
Typosquatting
A ____ attack exploits typographical errors in domain names.
ls
The Linux command used to list directory contents.
Unreadable
Cryptography secures information by transforming it into an ____ format.
Digital ethics
____ involves principles of right and wrong in the digital world.
cat
The Linux command used to display the contents of a file.
Cyber attack
A "Capture The Flag" (CTF) exercise simulates real-world ____ scenarios.
Cybersecurity
The practice of protecting systems from digital attacks.
Encryption
While malware and social engineering are threats, ____ is a defensive tool to protect data.
Flag
In cybersecurity, CTF stands for Capture the ____.
Graphical
CLI is text-based, while GUI is ____-based.
A
The hexadecimal equivalent of binary 1010 is ____.
Salting
____ involves adding random data to hash inputs to ensure unique outputs.
Distribution
A ____ is a version of the Linux operating system.
Trusted
Phishing acquires sensitive info by pretending to be a ____ entity.
Binary
The number system used by computers to process data.
Scanner
A common CTF tool for finding vulnerabilities is a network ____.
Hashes
Hashing is used to generate unique ____ for data.
rm
The Linux command used to remove (delete) a file.
Cryptanalysis
____ is concerned with decrypting and analyzing codes.
Rainbow table
Salting protects passwords against ____ attacks.
Encryption
The process of protecting data by converting it into a code.
Permissions
Basic Linux account management involves managing users and ____.
Line
CLI stands for Command ____ Interface.
2
The term "binary" refers to a number system using base ____.
Privacy
A cybersecurity ethics tenet is respecting the ____ of others.
Ransomware
Being locked out of a system until money is paid is a ____ attack.
Graphical
GUI stands for ____ User Interface.
Phishing
The goal of ____ is to trick individuals into revealing personal information.
Windows
While Ubuntu and Debian are Linux distributions, ____ is not.
Coded
Encryption converts data into a ____ code.
Watering hole
A ____ attack compromises a site visited by a target group.
Fixed
Hashing generates a ____-size string.
Phishing
Credential harvesting is done through emails and ____ websites.
Random
Salting protects data by adding ____ data during hashing.
Threats
The cybersecurity analyst protects systems from ____.
Domain
Typosquatting exploits errors in ____ names.
Breaking
Cryptanalysis involves ____ encryption codes.
rm
____ is a Linux command used to remove.
Deception
Credential harvesting obtains credentials through ____.