Cybersecurity & Cryptography: Key Concepts and Linux Commands

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

50 Terms

1
New cards

Cryptography

The practice of writing and solving codes to secure communication.

2
New cards

16

The hexadecimal system is based on the number ____.

3
New cards

Analyst

A common career path in the field is a Cybersecurity ____.

4
New cards

Visited

A "Watering Hole" attack compromises a website that is known to be ____ by a target group.

5
New cards

Phishing

A technique used to obtain user credentials through deception via fake emails or websites.

6
New cards

Threats

The primary purpose of cybersecurity is to protect information and systems from digital ____.

7
New cards

cd

The Linux command used to change the current directory.

8
New cards

1

Binary code represents data using two states: 0 and ____.

9
New cards

Encrypt

Ransomware attacks are designed to ____ user data and demand payment.

10
New cards

Logic

A fundamental digital electronics building block is the ____ gate.

11
New cards

Integrity

Hashing ensures data ____ by converting it into a fixed-size string.

12
New cards

Typosquatting

A ____ attack exploits typographical errors in domain names.

13
New cards

ls

The Linux command used to list directory contents.

14
New cards

Unreadable

Cryptography secures information by transforming it into an ____ format.

15
New cards

Digital ethics

____ involves principles of right and wrong in the digital world.

16
New cards

cat

The Linux command used to display the contents of a file.

17
New cards

Cyber attack

A "Capture The Flag" (CTF) exercise simulates real-world ____ scenarios.

18
New cards

Cybersecurity

The practice of protecting systems from digital attacks.

19
New cards

Encryption

While malware and social engineering are threats, ____ is a defensive tool to protect data.

20
New cards

Flag

In cybersecurity, CTF stands for Capture the ____.

21
New cards

Graphical

CLI is text-based, while GUI is ____-based.

22
New cards

A

The hexadecimal equivalent of binary 1010 is ____.

23
New cards

Salting

____ involves adding random data to hash inputs to ensure unique outputs.

24
New cards

Distribution

A ____ is a version of the Linux operating system.

25
New cards

Trusted

Phishing acquires sensitive info by pretending to be a ____ entity.

26
New cards

Binary

The number system used by computers to process data.

27
New cards

Scanner

A common CTF tool for finding vulnerabilities is a network ____.

28
New cards

Hashes

Hashing is used to generate unique ____ for data.

29
New cards

rm

The Linux command used to remove (delete) a file.

30
New cards

Cryptanalysis

____ is concerned with decrypting and analyzing codes.

31
New cards

Rainbow table

Salting protects passwords against ____ attacks.

32
New cards

Encryption

The process of protecting data by converting it into a code.

33
New cards

Permissions

Basic Linux account management involves managing users and ____.

34
New cards

Line

CLI stands for Command ____ Interface.

35
New cards

2

The term "binary" refers to a number system using base ____.

36
New cards

Privacy

A cybersecurity ethics tenet is respecting the ____ of others.

37
New cards

Ransomware

Being locked out of a system until money is paid is a ____ attack.

38
New cards

Graphical

GUI stands for ____ User Interface.

39
New cards

Phishing

The goal of ____ is to trick individuals into revealing personal information.

40
New cards

Windows

While Ubuntu and Debian are Linux distributions, ____ is not.

41
New cards

Coded

Encryption converts data into a ____ code.

42
New cards

Watering hole

A ____ attack compromises a site visited by a target group.

43
New cards

Fixed

Hashing generates a ____-size string.

44
New cards

Phishing

Credential harvesting is done through emails and ____ websites.

45
New cards

Random

Salting protects data by adding ____ data during hashing.

46
New cards

Threats

The cybersecurity analyst protects systems from ____.

47
New cards

Domain

Typosquatting exploits errors in ____ names.

48
New cards

Breaking

Cryptanalysis involves ____ encryption codes.

49
New cards

rm

____ is a Linux command used to remove.

50
New cards

Deception

Credential harvesting obtains credentials through ____.