NOCTI Cybersecurity Certification Exam

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/102

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

Phishing

The fraudulent practice of sending email claiming to be from reputable companies in order to induce people to reveal personal information, such as passwords and credit card numbers.

2
New cards

Identity theft

Thieves steal your personal information such as social security and credit card numbers to take over or open new accounts, file fake tax returns, or do other criminal things in your name.

3
New cards

Ransomware

A type of malicious software designed to block access to a computer system until a sum of money is paid.

4
New cards

Hacking

The act of shutting down or misusing websites or computer networks.

5
New cards

Backing up log files

Communicate incident handling and the response process. Also, an important part of evidence gathering.

6
New cards

Breach

Occurs when a hacker successfully exploits a vulnerability to gain access files on a computer or network.

7
New cards

Security incident

A violation of a company security policy.

8
New cards

Make a bit-level copy

First step in digital forensics is to ___ of the computer's hard drive.

9
New cards

One-to-one copy

All files is an important aspect of evidence gathering. This important first step of digital forensics to ensure that the data is not changed.

10
New cards

Restore and repair any damage

After an intrusion has occurred and the intruder has been removed from the system the next step is to __

11
New cards

Log forensics

Refers to the process of analyzing log data to identify the time a security incident was initiated, who initiated it, the sequence of actions, and the impact it had on the business. It also helps to identify the data that has been affected by an attack and to identify the attack pattern.

12
New cards

Data redundancy

Multiple copies of the data across multiple storage solutions, such as the in cloud

13
New cards

Risk categorization

Identifying risks and ranking them with the most critical risks listed first.

14
New cards

Risk mitigation

Company implements protective measures to prevent a risk, such as immediately applying software updates.

15
New cards

Risk acceptance

Making the decision to assume the risk.

16
New cards

Deferred risks

Deciding not to take actions to mitigate a risk.

17
New cards

Risk is low and the risk damage is low

An organization can choose to accept and defer risk.

18
New cards

Virtual Private Network (VPN)

Allow remote users to access corporate applications and resources via a secure encrypted connection. Users to remain anonymous on the internet by masking the location and encrypting traffic.

19
New cards

IP Address

A numerical label assigned to each device connected to a computer network or the internet.

20
New cards

Malware

Broad term that includes viruses, trojans, worms, and ransomware.

21
New cards

Trojan Horse

A program that looks like a legitimate or harmless program but is actually a malicious program that tricks users into running it. Also, create a backdoor into a computer system.

22
New cards

Worm

Malicious software that spreads on its own through computer networks.

23
New cards

Virus

Malicious software code that is unleashed and attempts to perform its destructive content when it is opened or accessed.

24
New cards

Distributed Denial of Service (DDoS)

Shuts down a website by flooding it with traffic or data from multiple sources.

25
New cards

Advanced Persistent Threat (APT)

Uses sophisticated expertise and multiple attack vectors such as cyber, physical, and deception to achieve its objectives.

26
New cards

Blacklisting

Restricting access to a website for a specific user group.

27
New cards

Whitelisting

Allowing a website to be accessed by an individual or user group.

28
New cards

Cryptography

The practice of creating secure messages.

29
New cards

Substitution Cipher

Each letter represents a different letter.

30
New cards

Transposition Cipher

Rearranges the letters in a message.

31
New cards

Pigpen Cipher

Geometric substitution cipher that exchanges letters for symbols that are contained within grid fragments.

32
New cards

Caesar Cipher

Oldest and simplest substitution cipher

33
New cards

Font Code (Steganography)

Making small changes to characters to mark them in a manner that is invisible to the unaided human eye.

34
New cards

One Time Pad

Cipher that is used only one time.

35
New cards

Encryption

The process of converting plain text (data) into symbols or codes to prevent unauthorized access to information and safeguard it.

36
New cards

Symmetric Encryption

Uses the same key for encryption and decryption.

37
New cards

Offset

The number of positive or negative spaces to move in order to encrypt a message.

38
New cards

Asymmetric encryption

Uses two keys, a public key and a private key, to encrypt or decrypt.

39
New cards

Clickjacking

A user selects a hyperlink and accidentally installs malware.

40
New cards

Dictionary Attack

Compares passwords against a list of words and their hash values.

41
New cards

Plaintext

Ordinary readable text before it is encrypted into ciphertext.

42
New cards

Known Plaintext Attack

Occurs when a hacker has the ciphertext and knows the plaintext.

43
New cards

Chosen Plaintext Attack

Plaintext message is generated by the attacker from which the ciphertext can be obtained from the same key.

44
New cards

Vulnerability

A security flaw, glitch or weakness found in an application or operating system.

45
New cards

Use a different password for each account

Prevent a hacker from gaining access to all of a user's account.

46
New cards

.exe

File extensions that increase the risk of exploitation attacks. They should never be allowed into the network.

47
New cards

Remove the compromised computer

To prevent a threat from spreading across a network.

48
New cards

Run an antivirus program with the latest virus definitions

If computer that appears to be infected.

49
New cards

Antivirus Software

Detects, blocks, and removes viruses, spam and spyware to protect the computer from the risks associated with unwanted emails and other attacks.

50
New cards

Virus Signatures

File or multiple files that are downloaded by a security program to identify a computer virus.

51
New cards

Proxy Server Configuration

Allows technicians to check the web browsing settings to see why a hyperlink is being automatically redirected to a malicious website.

52
New cards

Laws and procedures

Used for cellphone and cybersecurity are hard to enforce because emerging technologies are ongoing and updated information changes the process.

53
New cards

Role-Based Access Control (RBAC)

Assigning permissions to users based on their role/job within an organization.

54
New cards

Discretionary Access Control (DAC)

The principle of restricting access to objects based on the identity of the subject. It is the least restrictive method.

55
New cards

CIA Triad

Confidentiality, Integrity, and Availability

56
New cards

Least Privilege

Assign only the rights and privileges necessary to do his/her job.

57
New cards

Confidential

Term used by government agencies as a security label.

58
New cards

Integrity

Ensuring data is accurate, complete, and hasn't been altered or destroyed without authorization.

59
New cards

Availability

Ensuring that information and systems are accessible to authorized users when needed, preventing unauthorized access or disruption.

60
New cards

Zero Day

An exploit that is found or used before it is known to exist by the software maker, before the software is able to be patched or repaired. It is has not known fix yet.

61
New cards

Man-in-the-middle

A hacker intercepts the data transmitted between the client and the wireless access point.

62
New cards

Man Trap

A type of access control that does not require a computer; it contains a trespasser between two locked doors.

63
New cards

Applying OS updates and patches

This should be done as one of the first steps after the installation of a new operating system.

64
New cards

Updating / patching to the latest versions of antivirus software.

Regular preventive maintenance.

65
New cards

Validated periodically

Host systems and servers should be _

66
New cards

according to the company security policy.

67
New cards

Disable non-essential services

Running on a computer to help mitigate exploits.

68
New cards

Service Pack

Corrects operating system problems and addresses security vulnerabilities.

69
New cards

Patch

Fixes for specific security vulnerabilities or bugs in a software program.

70
New cards

Test and validate software updates

Patches on one computer before updating all of the computers on the network.

71
New cards

Firmware updates

Cause router settings to reset to the default. Check the router settings if problems occur afterwards.

72
New cards

Tailgating

Closely following an authorized person into a secure area.

73
New cards

Shoulder Surfing

Unauthorized viewing of a display to gain information.

74
New cards

Whaling

Phishing attack that targets a high-profile employee to obtain information.

75
New cards

Spear fishing

Phishing attack targeting specific individuals.

76
New cards

Access Control Lists (ACL)

Used to restrict a user's or group's ability to read, write, and execute files in an operating system.

77
New cards

Preventing an Internet Control Message Protocol (ICMP) flood DDoS attack

accomplished by disabling the functionality of the targeted router, computer or other device. By setting your perimeter firewall to block pings, you can effectively prevent attacks launched from outside your network.

78
New cards

Authentication

Allows a user access to a computer system using credentials such as a password. The process of verifying the identity of the user.

79
New cards

Secure passwords

UPPERCASE & lowercase letters, numbers, and special characters / symbols.

80
New cards

Multi-factor authentication

Uses a combination of two or more authentication methods.

81
New cards

Authorization

The process of enforcing policies after the user has been authenticated.

82
New cards

Secure Sockets Layer (SSL)

An encryption method used to encode credit card numbers to prevent theft.

83
New cards

Single Sign-On

Using one authentication to gain access to all network resources.

84
New cards

Biometrics

Authentication method using measurement and analysis of a biological feature.

85
New cards

Physical Biometric Technology

Focuses on physical traits such as fingerprints, facial recognition, and retinal scans.

86
New cards

Eye Recognition

Verified identification based on iris patterns and retinal recognition.

87
New cards

Behavioral Biometric Technology

Authentication method identifying measurable patterns in human activities; such as keystrokes, signatures, and voice recognition.

88
New cards

Secure servers in a data center

Provide the best physical security options for critical systems

89
New cards

Time clocks

Badges and smart cards are often used.

90
New cards

False Negative

Occurs when a biometric device reports that an authentic user is not recognized.

91
New cards

Hash

Mathematical function (algorithm) that creates a value based on the data. It is a one-way process uniquely identifying data. Also, used to substantiate the integrity of digital evidence.

92
New cards

Cyber espionage

A form of cyber attack that steals classified, sensitive data or intellectual property to gain an advantage over a competitive company or government entity.

93
New cards

Secure evidence container

Where the evidence collected by investigators is stored. It should be kept confidential.

94
New cards

Chain of Custody

Records where, when, and who collected the evidence. It must show access to, storage, and transportation of evidence from the crime scene to the courtroom. Evidence collected from a crime scene must be secured during transportation and storage.

95
New cards

Windows Registry

Contains information that Windows continually references during operation, such as profiles for each user, the applications installed on the computer and the types of documents that each can create, property sheet settings for folders and application icons, what hardware exists on the system, and the ports that are being used.

96
New cards

Log analysis

The process of reviewing computer-generated event logs to proactively identify bugs, security threats or other risks.

97
New cards

Intrusion detection systems

Create log files that can be used to detect breaches.

98
New cards

Making a bit-to-bit ratio copy

All files is an important aspect of evidence gathering. This is an important first step of digital forensics to ensure that the data is not changed

99
New cards

Certified Digital Forensic Examiner

An investigator with the training and experience to properly analyze sensitive evidence.

100
New cards

Digital Forensic Analysis Steps

Procedure development, evidence assessment,