Cybersecurity - PLTW EoC Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

Malware

Software spread by people through websites, email, and messages.

2
New cards

Viruses

Infect your computer and cause problems.

3
New cards

Worm

Unlike a virus, a worm does not need a human to spread; it replicates on its own to infect other computers.

4
New cards

Backdoor

Malicious software that gets past normally restricted access.

5
New cards

Spyware

Software that secretly collects information about you; sits on websites or other services such as emails.

6
New cards

Trojan Horse

Malicious program disguised as legitimate software; users may download it accidentally thinking it was actual software.

7
New cards

.bat Batch File

Opens a Batch file script.

8
New cards

.vbs VBScript (Virtual Basic Script)

Opens VBScript.

9
New cards

.hta HTML

Opens a program.

10
New cards

\

Used to find any word or file name.

11
New cards

datemodified\today and datemodified[date]

Used to find files modified on that specific date.

12
New cards

kind=

Used to find a file in a specific location.

13
New cards

kind=folder

Used to find a file in any folder.

14
New cards

\SEC kind=folder

Used to find SEC in any file name in any folder.

15
New cards

kind=\

Used to find any kind of file.

16
New cards

datemodified\

Used to find a file from any date.

17
New cards

Using NOT

You can exclude things in your search.

18
New cards

CIA Triad

Confidentiality, Integrity, Availability.

19
New cards

Confidentiality in the CIA Triad

Government secrets, access codes to critical systems, financial info like bank account and credit card numbers.

20
New cards

Integrity in the CIA Triad

Air traffic control data, hospital data such as prescription doses and surgery schedules.

21
New cards

Availability in the CIA Triad

Movie times, shopping sites, search engines and results.

22
New cards

Disconnect

An add-on that prevents extra websites not related to the original website from popping up.

23
New cards

Passive Analysis

Searching through a website’s details without affecting their systems.

24
New cards

AWS

Secure cloud service that is an expansion of different services and serves many functions.

25
New cards

Cloud9

A way to access data without hurting your computer.

26
New cards

Whois

Shows when a domain was created and by whom; shows info about a URL.

27
New cards

sudo yum install

Install code system.

28
New cards

Nslookup

Allows user to find domain names, URLs, and IP addresses.

29
New cards

Traceroute

Shows the path a network, server, and domain goes.

30
New cards

-d

Omits domain name translation.

31
New cards

Netstat

Converts IP addresses to domain names.

32
New cards

-n

Displays numeric IP addresses.

33
New cards

Botnet

Software that replicates and infects many computers, turning them into “zombies” remotely controlled by attackers.

34
New cards

Keylogger

Software/hardware that tracks what keys are pressed to gain info from the user.

35
New cards

Man in the Middle

Human-based attack where a user intercepts communication between a computer and the internet.

36
New cards

Ransomware

Software that locks a computer, forcing the user to pay to unlock it.

37
New cards

Rootkit

Software with elevated privileges to control a computer or gain restricted accounts and data.

38
New cards

Programming Error

Bugs/problems in a program that allow attackers to access the computer.

39
New cards

Ping Flood

Attacker overwhelms a user with packets.

40
New cards

Ping of Death

Sends malicious ping to a computer.

41
New cards

Smurf Attack

Sends packets to exploit broadcast networks.

42
New cards

Mailbomb

Attempting to overflow a mailbox.

43
New cards

Teardrop

Sending fragmented packets to one computer.

44
New cards

MAC Addresses

Permanent identifier of a network device; used to know where to send data.

45
New cards

Hexadecimal

Base-16 number system (0-9 & A-F).

46
New cards

NIC

Network Interface Card; a physical component on a computer or device that provides connectivity to a network.

47
New cards

IEEE

Institute of Electrical and Electronic Engineers; known for developing standards in the computer and electronics industries.

48
New cards

TCP Handshake

A 3-way communication method using SYN, SYN-ACK, and ACK to establish a connection between hosts.

49
New cards

ls

Lists the contents of a directory.

50
New cards

-R

Shows the entire directory structure recursively.

51
New cards

cd

Changes directory.

52
New cards

cd [filename]

Changes to a subdirectory.

53
New cards

cd ..

Changes to the parent directory.

54
New cards

.

Indicates the current directory.

55
New cards

pwd

Prints the working directory.

56
New cards

cat

Displays the contents of a file.

57
New cards

mkdir

Creates a directory.

58
New cards

mv

Moves a file/directory to a new name or location.

59
New cards

mv [source] [destination]

Moves files.

60
New cards

touch

Creates a file or changes its timestamp.

61
New cards

cp

Copies a file/directory to a new name or location.

62
New cards

cp [source] [destination]

Copies files.

63
New cards

rm

Deletes a file.

64
New cards

rmdir

Deletes an empty directory.

65
New cards

file

Shows a file’s type as determined by the operating system.

66
New cards

gpg

Encrypts/decrypts a file.

67
New cards

-c

Creates an encrypted version of a file.

68
New cards

-d

Decrypts an encrypted file.

69
New cards

ps

Shows running system processes.

70
New cards

-ef

Shows everyone's processes in a formatted output.

71
New cards

--sort=uid

Groups all user processes together.

72
New cards

more

Displays file content like cat, but lets you scroll.

73
New cards

bg/fg

Sends process to background or brings it to foreground.

74
New cards

grep

Searches for strings in a file or command output.

75
New cards

-e

Searches for multiple separate strings.

76
New cards

su

Changes your user ID to root (admin).

77
New cards

kill

Terminates a process.

78
New cards

-9 or -KILL

Forcefully kills a process.

79
New cards

-w

Filename where packets will be saved.

80
New cards

-n

Records IP addresses instead of hostnames.

81
New cards

Cipher

An algorithm used for encryption or decryption.

82
New cards

Cryptography

The science/art of delivering a message securely.

83
New cards

Plain text

The original message before encryption.

84
New cards

Cipher text

The encrypted version of the message.

85
New cards

Substitution Cipher

Replaces each letter with a different character or symbol.

86
New cards

Encryption Key

A string that determines the output of an encryption algorithm.

87
New cards

Private Key Encryption

Sender and receiver share the same key.

88
New cards

Symmetric Key Encryption

Same key used for encryption and decryption.

89
New cards

Public Key Encryption

Uses large prime numbers, private and public keys.

90
New cards

TPM

Trusted Platform Module; provides secure encryption for a drive.

91
New cards

Disk

The physical drives in a computer.

92
New cards

Volume

The accessible storage area on a disk.

93
New cards

Partitions

A section of a volume formatted for storage.

94
New cards

Hash Functions

Converts data of any size into a fixed size.

95
New cards

Steganography

Hides messages within other data.

96
New cards

Least Significant Bit

The rightmost bit in a byte.

97
New cards

Alternative Data Stream

Attaches data to a file without changing its content or size.

98
New cards

Digital Watermarking

Embeds small information without impairing the file.

99
New cards

Message Digests

The hash value generated by a hash function.