1/32
Flashcards based on lecture notes about cyber security concepts.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does Cyber Security provide security against?
Malware, cyber-terrorists, and other threats
Who is popularly known as the father of cyber security?
Robert August Kerckhoffs
Which of the below does not constitute a cybercrime?
AES (Advanced Encryption Standard)
Which of the below benefits of cyber security is not true?
System getting slower, Computer lagging and crashes
Which of the below does not qualify as a form of peer-to-peer cybercrime?
Phishing
Any company or agency’s IT protection is managed and maintained by _.
IT Security Engineer
Which of the below security encryption standards is the weakest?
WEP
Which of the below measures can help reduce the risk of data leakage?
Authentication
___ means the security of data from tampering by unidentified users.
Integrity
Which of the below implemented is not a good means of safeguarding privacy?
Switching off the phone
The authenticity and security of data travelling over a network are ensured by ____.
Network-security protocols
A single entrance for multiple connectivity is called as ____.
Directory service
The initial phase of ethical hacking is _.
Foot printing
In system hacking, which of the below is the most crucial activity?
Cracking passwords
Which of the below cyber security principles states that the security system should be as compact and straightforward as possible?
The economy of the Mechanism
The first hacker’s conference was held in which of the below locations?
DEFCON
Which of the below is used to analyse network flow and monitor traffic?
Network traffic analysis
_ are programmes or procedures that enable hackers to maintain control of a computer system.
Exploits
What does Cyber Security do?
Provides security against malware, provides security against cyber-terrorists, protects a system from cyber attacks
Which of the following is a type of cyber security?
Cloud Security, Network Security, Application Security
What are the features of cyber security?
Compliance, Defence against internal threats, Threat Prevention
Which of the following is an objective of network security?
Confidentiality, Integrity, Availability
Which of the following is a type of cyber attack?
Phishing, SQL Injections, Password Attack
In which year has hacking become a practical crime and a matter of concern in the field of cyber technology?
1983
Which of the following act violates cyber security?
Exploit, Attack, Threat, Vulnerability
Which of the following is defined as an attempt to harm, damage or cause threat to a system or network
Cyber Attack
What is the existence of weakness in a system or network is known as?
Vulnerability
Which of the following is not a step followed by cyber- criminals in data breaching?
Fixing the bugs
Which of the following term refers to a group of hackers who are both white and black hat?
Grey Hat hackers
Which of the following is not an email-related hacking tool?
Sendinc
Which of the following DDoS in mobile systems wait for the owner to trigger the cyber attack?
botnets
Which of the following is a Stuxnet?
Worm
Which of the following can diminish the chance of data leakage?
Authentication