cpe 046 p3 Flashcards

1
Q

is the practice of protecting systems,
networks, and programs from digital attacks.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the term used for a broad range of malicious
activities accomplished through human interactions.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

attacks are a bundle of false
promises to exasperate a sufferer’s cupidity or curiosity.

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involves victims being bombarded with false alarms and
fictitious threats.

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The scam is often initiated by a perpetrator
pretending to need sensitive information from a victim so as to
perform a critical task.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a more targeted version of the phishing scam
whereby an attacker chooses specific individuals or enterprises.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the attackers promise a
reward in exchange for information.

A

Quid Pro Quo (Something for Something)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In this, attackers usually target the
person who likes to get involved romantically or sexually
with someone online.

A

Honey Traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

may refer to anyone with technical skills,
however, it typically refers to an individual who uses his or her skills
to achieve unauthorized access to systems or networks so as to
commit crimes.

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Hackers

A
  • White Hat –
  • Gray Hat -
  • Black Hat -
  • Green Hat -
  • Blue Hat -
  • Red Hat -
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Organized Hackers

A
  • Hacktivists
  • Terrorists
  • State-backed hackers
  • Internet stalkers
  • Disgruntled Employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the unlawful use of violence and intimidation,
especially against civilians, in the pursuit of political aims.

A

Terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

tend to be more interested in embarrassing
companies or publicizing damning evidence of some sort and
are usually not interested in robbing their targets of money or
assets.

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

are carried out by cyber criminals
directly linked to a nation-state to exploit infrastructure
vulnerabilities.

A

State-backed hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is conducted through the use of social networking
platforms and malware, that are able to track an individual’s PC
activity with little or no detection.

A

Internet stalkers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disgruntled employees become
hackers with a particular motive and also commit cyber crimes.

A

Disgruntled Employees

17
Q

a kind of information gathering on
network system and services. This enables the attacker to
discover vulnerabilities or weaknesses on the network.

A

Reconnaissance

18
Q

ICMP

A

Internet Control Message Protocol

19
Q

a common technique used to discover open doors or weak
points in a network.

A

Port Scans

20
Q

technique whereby packet data flowing across the network
is detected and observed.

A

Packet Sniffing