Cybersecurity Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Digital Footprint

Information or data left behind by when using social media

2
New cards

Phishing

Cyber crime attempting to trick a user into providing sensitive data by posing as a

3
New cards

legitimate company

4
New cards

DDoS

Type of attack that overwhelms a server with traffic that prevents others from accessing

5
New cards

Malware

Any type of software designed to harm a computer or network

6
New cards

Ransomware

Malware that prevents users from accessing their files until a ransom is paid

7
New cards

Internet of Things

Everyday “smart” objects that are connected to the internet

8
New cards

(CIA)Confidentiality

Restrict access to sensitive information

9
New cards

(CIA)Integrity

Protects information from being tampered with or removed

10
New cards

(CIA)Availability

Allows quick and easy access to the information

11
New cards

“Black Hat Hacker”

12
New cards

“White Hat” Hacker”

13
New cards

“Grey Hat” Hacker

14
New cards

Cryptography

Encrypts information so that only authorized people can read/access it

15
New cards

Encryption

Converts information into an unreadable format

16
New cards

Decryption

Converts encrypted information back to a readable format

17
New cards

Plaintext

The information before encryption

18
New cards

Cipher

an algorithm that gives the process for performing encryption

19
New cards

Ciphertext

The coded information after plaintext has been encrypted

20
New cards

Key

Tells the user how the cipher encrypted the data. Needed for decryption

21
New cards

Caesar Cipher

A simple substitution cipher that replaces each plain text letter with a different letter in sequence based on shift number (key)

22
New cards

Vigenere Cipher

A more complex substitution cipher that uses a keyword where each letter is a different caesar key

23
New cards

Brute Force

A method of cracking encryption using trial and error to check every possibility

24
New cards

Frequency Analysis

A method of cracking encryption that looks for letters that occur more often

25
New cards

Operating System (OS)

software that manages all hardware and applications of a computer

26
New cards

Firmware

Software embedded in a device that controls very basic functions (starting up)

27
New cards

Hardware

The physical components of a computer

28
New cards

Software

Set of instructions that tells a computer what to do (applications, system processes)

29
New cards

Antivirus Software

Specific software that scans for and removes malicious software

30
New cards

Proxy Settings

Allows a “middle” and privacy between the user and the internet for increased security

and privacy

31
New cards

Private Browsing

Does not save to history or cache

32
New cards

Administrator account

highest level user account, can do everything including create new users

33
New cards

Guest Account

lowest level user account, can’t make any changes and software in their system are as secure as possible.

34
New cards

Binary

The language of computers, uses only zeros and ones

35
New cards

Bits

A single digit in the binary number system, smallest unit of storage

36
New cards

IP Address

Internet Protocol Address, every device on the internet has a unique one

37
New cards

Routing

Sending data between two computers on the internet determining its path

38
New cards

Packets

Unit of data that is sent over a network, usually to break large data into smaller parts

39
New cards

Motherboard

Circuit board that connects all of the components of a computer

40
New cards

Processor (CPU)

Central processing unit that accepts and executes instructions

41
New cards

Memory (RAM)

Random access memory that temporarily stores information needed right away

42
New cards

Storage (Hard Drive/SSD)

Stores and retrieves data

43
New cards

Input device

Peripheral devices connected to a computer to provide data and control signals

44
New cards

Driver

files that allow a device to communicate with the computer’s operating system

45
New cards

Network Ports

location where information is sent from one computer to another

46
New cards

Data

a collection of raw numbers or data points

47
New cards

Information

data that is organized or structured to give it context or meaning

48
New cards

Knowledge

information that is analyzed to gain additional insight

49
New cards

Penetration Testing

“white-hat” legal hacking at the request of an organization to test their system for vulnerabilities and help repair them

50
New cards

SQL

a query language used to retrieve data from a database management system

51
New cards

SQL Injection

an attack where an input is used to run malicious SQL statements

52
New cards

Physical Vulnerabilities

a weakness in the hardware of physical environment of a network

53
New cards

Human Vulnerabilities

accidents made by people in a network, either intentional or accidental

54
New cards

Software Vulnerabilities

any outdated or unsecure software within a network

55
New cards

Password Security

avoid common words, use a mix of characters, and have different passwords