Course One Module 2 Glossary Terms Flashcards

Glossary wrap up for Module 2

1
Q

This is a technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.

A

Adversarial Artificial Intelligence (AI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of phishing attack where a threat actor impersonates a known source to obtain a financial advantage.

A

Business Email Compromise (BEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Certified Information Systems Security Professional is a globally recognized and highly sought after information security certification, awarded by the International Information Systems Security Certification Consortium.

A

CISSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malicious code written to interfere with computer operations and cause damage to data and software

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack that affects secure forms of communication between a sender and intended recipient

A

Cryptographic Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any person who uses computers to gain access to computer systems, networks, or data.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software designed to harm devices or networks

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attempt to access password secured devices, systems, networks, or data

A

Password Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security incident that affects not only digital but also physical environments where the incident is deployed

A

Physical Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

A

Physical Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A manipulation technique that exploits human error to gain private information, access, or valuables

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

A

Social Media Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

A

Supply-chain Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

A

USB Baiting

17
Q

refer to “computer virus”

A

Virus

18
Q

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

A

Vishing

19
Q

A type of attack when a threat actor compromises a website frequently visited by a specific group of users

A

Watering Hole Attack