Cyber Flashcards

1
Q

Absolute file path

A

While diagnosing a server issue in a Linux environment, an engineer references /etc/apache2/apache2.conf to specify the entire location beginning at root. This ensures pinpoint accuracy, preventing mistakes that arise when relative paths lead to overlooked or duplicate directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access controls

A

Within a financial institution, only certain employees handle loan applications. Privilege settings and password policies prevent unauthorized team members from accessing sensitive records, demonstrating how organizational structure can reinforce data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active packet sniffing

A

An attacker stealthily intercepts and modifies traffic between a buyer’s browser and the online store. Payment details are altered in-flight, illustrating how unprotected channels can be manipulated to redirect funds or steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address Resolution Protocol (ARP)

A

Before a workstation sends data over a network, it needs the physical identifier of the next router. A lookup matches the numeric network address to the hardware address, ensuring that packets flow to the intended destination without confusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced persistent threat (APT)

A

A rogue actor quietly infiltrates a large corporation’s data center, siphoning off confidential research for months. The intruder stays hidden by blending into normal traffic patterns, prolonging the breach and maximizing the data theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversarial artificial intelligence (AI)

A

A machine-learning email filter is gradually fed deceptive training examples by malicious entities. Over time, the filter flags fewer scam emails, revealing how subtle interference can sabotage advanced automated defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

A free media player continuously launches pop-up banners and embedded offers whenever it’s opened. Users grow frustrated with the frequent interruptions, unaware that these on-screen promotions generate revenue for the software’s distributor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm

A

A mapping service calculates the optimal driving route by weighing real-time congestion, planned road closures, and distance. This step-by-step logic systematically chooses the path that balances speed and convenience under given conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analysis

A

A security professional receives an off-hours notification about multiple account lockouts. Delving into logs, traffic captures, and error messages helps uncover whether an automated script or a determined threat actor is probing the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Angler phishing

A

A criminal masquerades as social media support for a well-known entertainment platform, assuring worried users they can fix billing issues if they provide credit card details. The personal touch convinces many victims that the messages are genuine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly-based analysis

A

A financial service flags a credit card purchase for review when it doesn’t match the owner’s habitual spending pattern. Rather than relying on known attack signatures, the system spots outliers that might indicate fraudulent use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus software

A

A computer utility constantly watches incoming files and background processes, erasing any discovered malicious code. This routine scanning keeps everyday operations safer by halting harmful executables before they spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application

A

A user launches a dedicated program on their device to edit images for a marketing brochure. This tool focuses on a specific task—modifying graphics—offering features unavailable in more general-purpose software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application programming interface (API) token

A

A weather service grants a unique encrypted code to an app developer, letting the app retrieve the latest forecast data. Each request is verified with this code to confirm it’s coming from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Argument (Linux)

A

Someone inputs ls -l /var/www/html to see file details in the web directory. The program uses /var/www/html as the subject of the listing, interpreting it as the location being examined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Argument (Python)

A

A custom function in a script might be called with add_score(10, 5). The function’s logic processes the numeric details passed in, adjusting a running total accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Array

A

A video game tracks the five best players in a structured list, ensuring quick access to scores and enabling easy updates whenever a new player surpasses a previous record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assess (NIST RMF)

A

An enterprise installs intrusion detection systems and verifies if they properly detect simulated attacks. Logs and test results show whether each control is effectively blocking potential threats before sign-off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Asset

A

A personal smartphone containing messages, photos, and credentials demands protective measures at both the software and physical levels—highlighting how essential resources deserve thorough safeguarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Asset classification

A

An IT department labels newly developed source code as “Restricted” while routine memos remain “Public.” This labeling process guides security budgets and safety measures based on risk and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Asset inventory

A

A hospital catalogs all electronic patient record systems, diagnostic devices, and lab computers, maintaining an organized list. This helps identify which equipment needs critical updates or security patches first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Asset management

A

A corporation monitors the current status of every server, laptop, and specialized tool, noting which ones pose vulnerabilities or need attention. Frequent reviews enable faster responses to evolving threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asymmetric encryption

A

An individual sends sensitive data using an open, shareable locking mechanism, while the intended reader alone holds the secret key for unlocking. This separation of locks and keys ensures that only the correct recipient can decode messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attack surface

A

A local shop sets up an online storefront, remote invoicing, and a cloud-based point-of-sale system. Each new feature potentially increases the ways intruders can break in, warranting thorough protective steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Attack tree

A

A tech company visualizes every possible weakness leading to customer data exposure, starting from phishing employee credentials to physically infiltrating the data center. Each path reveals how attackers might progress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Attack vectors

A

Cybercriminals might slip malicious files into a free download, craft believable email scams, or trick employees with public Wi-Fi. Each trick provides an entry point for covertly accessing protected environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Authentication

A

A secure portal requests a username, password, and face recognition. The combination fortifies identity verification, making unauthorized logins much harder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Authorization

A

A logged-in team member only sees certain options in the internal dashboard, while higher-level roles unlock advanced menus. Access boundaries reflect the functional separation of responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Authorize (NIST RMF)

A

Executive leaders review a comprehensive risk analysis for a new payment platform and formally approve it. This sign-off acknowledges both the benefits and the associated liabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Automation

A

A script closes stale support requests automatically if users don’t respond, reducing repetitive tasks for human agents. Fewer manual chores free time for more complex problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Availability

A

An online bookstore invests in redundant database clusters, balancing requests across several servers. Even if one goes offline, buyers can continue placing orders without interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Baiting

A

A USB stick labeled “Executive Salaries” is left in a break room, tempting a curious staff member to plug it in. Once opened, the device executes hidden malicious code on the host computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Bandwidth

A

Users in a crowded office notice slower connections whenever large data backups run. The pipeline capacity gets saturated, creating performance lags for everyone sharing the same link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Baseline configuration (baseline image)

A

New servers are rolled out using a standard template that has pre-installed security updates and necessary software. This consistency ensures each system aligns with the company’s vetted setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Bash

A

In a Unix-like environment, a professional types commands to navigate directories, manage files, and run scripts. The input is parsed and executed, offering powerful text-based control over the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Basic auth

A

A website prompts for a username and password, transmitting them in a simpler, less secure format without advanced cryptographic layers. This approach is direct but often replaced with stronger safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Basic Input/Output System (BIOS)

A

An older machine runs a tiny program after powering on, instructing hardware to find where the main operating system resides. This initial routine is critical for a successful startup sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Biometrics

A

A traveler at an airport gate confirms identity using a unique facial scan, streamlining the boarding process and cutting down on manual ID checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Bit

A

A single storage element in a digital device can only be on or off, signifying the most fundamental data building block in computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Boolean data

A

An access-control system has a switch that’s either on or off, marking whether a door is locked and reinforcing straightforward, yes/no logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Bootloader

A

When powering a smartphone, a minimal program starts running. It prepares the environment by checking components and then passes control to the main system software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Botnet

A

A large number of infected personal devices worldwide respond to hidden commands, sending spam or launching massive traffic floods upon a single orchestrated instruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Bracket notation

A

In a Python list, selecting index [3] retrieves the fourth element. This indexing method organizes data retrieval in a predictable way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Broken chain of custody

A

After seizing a suspect’s computer drive, an investigator forgets to log where it was kept overnight. Missing records create doubt about any evidence obtained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Brute force attack

A

A hacker repeatedly tries every conceivable password variation, hoping that a successful guess eventually grants entry to an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Bug bounty

A

A company publicly invites ethical hackers to find flaws, rewarding them with cash or recognition. This method helps identify holes before malicious actors discover them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Built-in function

A

A programming environment provides shortcuts—like quickly measuring a string’s length—enabling rapid coding without reinventing common operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Business continuity

A

A natural disaster knocks out power across the city, but alternate datacenters keep critical applications running. Customers experience minimal service disruption thanks to layered resilience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Business continuity plan (BCP)

A

A well-documented approach details backup office spaces and fallback technology solutions, allowing a seamless shift if the primary site becomes unreachable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Business Email Compromise (BEC)

A

An accountant receives an urgent request to transfer funds, seemingly from the CEO. The message includes just enough personal detail to appear genuine, pressuring quick action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Categorize (NIST RMF)

A

An online retailer identifies which servers are vital for processing payments and which systems only contain marketing data. Sensitivity levels guide where to dedicate the most robust defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

CentOS

A

A firm installs a freely available enterprise-grade server environment that mirrors a commercial product’s reliability. They focus on open-source benefits and stable long-term support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Central Processing Unit (CPU)

A

A user with multiple browser tabs, video editing, and data modeling open simultaneously relies on a core component that orchestrates and executes instructions at blazing speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Chain of custody

A

Investigators place sealed evidence in a labeled bag, logging the time and name of each person who handles it. This rigorous audit trail maintains the integrity of what’s collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Chronicle

A

A global corporation pipes all system logs into a powerful cloud-based console, letting security teams analyze suspicious patterns or correlate events across many regions in seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Cipher

A

A chat app scrambles messages so that, without the decoding steps, the text appears meaningless. The method ensures eavesdroppers see only jumbled content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Cloud-based firewalls

A

A small company relies on a hosted security layer that scans and filters traffic through a provider’s data center, offloading the need for on-premise appliances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Cloud computing

A

Engineers move from in-house hardware to remote hosted servers, paying only for the resources actually used. This flexibility saves costs and simplifies upgrades.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cloud network

A

Personal photos and documents stored on an internet-accessible service become reachable from any device, removing the dependence on physical storage mediums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Cloud security

A

A financial startup configures restricted roles, applies encryption, and monitors logs in a large hosting environment, ensuring customers’ data stays confidential despite the shared platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Command

A

A user at the console types mkdir projectDocs, instructing the environment to make a new folder for organizing files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Command and control (C2)

A

Compromised machines phone home to a hidden hub, awaiting fresh directives that could instruct them to launch attacks, steal data, or remain silent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Command-line interface (CLI)

A

In a server room, text-based instructions allow precise file manipulation, system monitoring, and script automation without needing a graphical display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Comment

A

Within a code file, short annotations clarify purpose or logic, but don’t impact how the computer ultimately executes operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Common Event Format (CEF)

A

A security platform receives logs with a consistent structure, including time, source, and event details, making it simpler to filter and analyze across diverse systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Common Vulnerabilities and Exposures (CVE®) list

A

A widely recognized index assigns numbers to newly found software weaknesses, letting teams track critical issues systematically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Common Vulnerability Scoring System (CVSS)

A

A software flaw that enables remote takeover might earn a near-maximum severity rating, motivating teams to fix it before lower-rated items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Compliance

A

A healthcare organization employs strict data handling protocols and encryption to align with applicable privacy mandates, ensuring legal and ethical standards are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Computer security incident response teams (CSIRT)

A

A specialized group steps in when malware strikes, investigating the extent, closing gaps, and helping the business resume normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Computer virus

A

A self-replicating file infiltrates various folders, attaching its destructive payload to unsuspecting programs until it’s detected or removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Conditional statement

A

A code block checks if an employee’s role is “manager,” then grants them access to advanced analytics. Otherwise, the system restricts them to basic views.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Confidentiality

A

A corporate portal ensures only authorized people can see internal sales figures. Encryption and strict credential checks keep outside eyes away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Confidential data

A

Engineers store design prototypes in a locked lab and limit access to senior staff. Revealing such materials could undermine competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Confidentiality, integrity, availability (CIA) triad

A

A secure hospital system only shows patient records to doctors, guards info from tampering, and ensures records stay online for medical emergencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Configuration file

A

A text entry—listen 443—within a server’s configuration sets which port to accept secure traffic, letting the software adapt without recompiling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Containment

A

After malware is detected on a workstation, administrators disconnect it from the network. This swift isolation prevents the infection from spreading deeper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Controlled zone

A

A company’s servers sit behind a protective barrier, separating them from public networks. Entry points are restricted to reduce unwanted infiltration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Cross-site scripting (XSS)

A

A malicious comment on a forum feeds unfiltered code to each visitor’s browser, secretly extracting login tokens for misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Crowdsourcing

A

A nonprofit group solicits ideas from global volunteers on designing better cybersecurity training modules, tapping the wisdom of many.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Cryptographic attack

A

A determined adversary tries various keys or algorithm tricks to unlock encrypted data, probing for any sign of mathematical weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Cryptographic key

A

A specialized string ensures that scrambled messages can only be unscrambled by someone holding the matching piece, preventing casual interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Cryptography

A

Messages in transit get encoded using transformations only authorized parties can reverse, deterring digital eavesdropping or forgery attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Cryptojacking

A

An unnoticed script hijacks a workstation’s processing power to mine virtual currency, causing performance slowdowns while quietly benefiting the attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

CVE Numbering Authority (CNA)

A

Certain prominent software makers receive the authority to assign official IDs to new vulnerabilities discovered in their products, streamlining tracking and disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Cybersecurity (or security)

A

An organization coordinates defenses—firewalls, employee training, encryption, and monitoring—so data theft or sabotage attempts are less likely to succeed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Data

A

Every online post, clicked link, or file download turns real-world actions into digital records, forming the essence of modern life’s information exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Data at rest

A

An archive of old user profiles on a backup drive remains untouched. Since it’s not actively in use, it’s only accessed when a restore is needed or a policy demands review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Database

A

A structured system organizes product inventories, customer orders, and shipping details into tables. Queries allow rapid lookups or updates at scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Data controller

A

A marketing team decides what personal details to collect for a campaign, setting how and why this information is used, shaping the broader data strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Data custodian

A

A hosting provider physically stores and secures files on behalf of an enterprise. Though they don’t dictate business rules, they must ensure that stored information remains safeguarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Data exfiltration

A

A disgruntled staff member discreetly copies sensitive intellectual property onto a hidden USB drive, intending to leak it to a competitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Data in transit

A

An emailed contract passes through multiple network routers, vulnerable to interception if it isn’t properly protected along the path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Data in use

A

While editing a spreadsheet, the active cells live in working memory, making them vulnerable if malicious software gains access at that moment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Data owner

A

An attorney in a law firm decides who has permission to open particular case files, taking ultimate responsibility for the confidentiality of that content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Data packet

A

A streamed video breaks into numerous small chunks. Each travels a complex route over the internet, reassembling seamlessly on the viewer’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Data point

A

A phone’s location log at a single timestamp stands as a discrete measurement among many that map user movement and behavior trends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Data processor

A

A marketing platform handles client-supplied email lists, sending promotions according to explicit client instructions without owning the data itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Data protection officer (DPO)

A

A hospital appoints a specialist to ensure all activities, from patient record handling to staff training, meet stringent data privacy regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Data type

A

In a script, numerical fields like 42 are processed differently than a text field like ‘Address.’ Each format is handled by different logic rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Date and time data

A

A system logs an event as 2025-01-15 14:00:00, documenting both calendar day and exact moment for thorough auditing or scheduling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Debugger

A

A developer halts a program mid-run to inspect values, stepping line-by-line to discover which logic flaw is causing a repeated crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Debugging

A

An interactive approach narrows down a bug by methodically eliminating issues, checking each variable until the faulty logic or calculation emerges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Defense in depth

A

A combination of perimeter firewalls, host-level monitoring, intrusion detection, and regular patching forms multiple overlapping shields to deter would-be infiltrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Denial of service (DoS) attack

A

Maliciously overwhelming a target with far more data requests than it can handle leaves legitimate users locked out, halting normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Detect (NIST core function)

A

A finance company sets up real-time monitoring systems that spot irregular transactions quickly, minimizing harmful fraud attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Detection

A

Network sensors alert an administrator the moment unusual outbound connections emerge, hinting at a possible early-stage intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Dictionary data

A

A key-value layout in code organizes user details, enabling quick lookups by specifying the field name for direct retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Digital certificate

A

While navigating to an encrypted site, the browser verifies a digital signature that vouches for the site’s legitimacy and encryption authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Digital forensics

A

After a network intrusion, specialists meticulously examine log files, memory captures, and disk images to piece together exactly how the incursion unfolded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Directory

A

A workspace on a system collects relevant files together, letting users and administrators keep projects separate and well-structured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Disaster recovery plan

A

A thorough document outlines how an organization will restore critical processes if a hurricane wipes out the main office, ensuring readiness for worst-case events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Distributed denial of service (DDoS) attack

A

An entire army of compromised machines collectively bombards a website with requests, pushing bandwidth and servers to their limits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Distributions

A

Enthusiasts select from variants that share a core platform but differ in available packages, default tools, or targeted use-cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Documentation

A

Explicitly written steps help staff respond consistently to suspicious emails, ensuring no critical action is missed under pressure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

DOM-based XSS attack

A

Malicious code is embedded into a webpage’s own script logic, activating when a user’s browser processes or interacts with certain elements locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Domain Name System (DNS)

A

Whenever a user types a website name, a lookup transforms that human-readable label into a numerical destination recognized by the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Dropper

A

A small, unremarkable file sneaks into a system and then quietly fetches a heavier malicious program, expanding the scope of the infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Elevator pitch

A

In a brief moment with a potential sponsor, someone articulates their cybersecurity background and major accomplishments, aiming to spark further discussion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Encapsulation

A

A hidden channel around the original data is formed, making outside observers see only protected information that they can’t decode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Encryption

A

An online banking service automatically scrambles all transmitted details, minimizing risk even if criminals intercept the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Endpoint

A

Workstations, mobile devices, or servers all connect to the bigger network and require protective measures, as they can be exploited individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Endpoint detection and response (EDR)

A

A protective client continually monitors a computer for questionable behavior, quarantining suspicious files and sending alerts for deeper review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Eradication

A

Once investigations confirm infiltration points, every trace of harmful code is uprooted, and vulnerable paths are reinforced against repeat attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Escalation policy

A

If an on-call engineer fails to address a severe nighttime breach within an hour, the incident auto-assigns to a more senior team for emergency containment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Event

A

A user logs in from a remote country at 3 A.M., prompting a flag in the security console that something might be amiss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Exception

A

Code attempting to open a file that doesn’t exist halts abruptly unless there’s a fallback routine specifying what to do in this unexpected case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Exclusive operator

A

A coding rule in a raffle app checks whether a user qualifies either for the discount or the freebie, but not both, ensuring no double rewards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Exploit

A

Attackers see an unsecured admin panel and slip in with zero barriers, taking advantage of a setting left wide open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Exposure

A

Sensitive credentials remain in a public repository, meaning anyone with a browser can locate and misuse the keys for unauthorized data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

External threat

A

Phishing emails from unknown origins flow into staff inboxes, aiming to dupe people into revealing internal login details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

False negative

A

Malicious code hides in plain sight because the scanner mistakenly believes the file is safe, allowing the infection to spread undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

False positive

A

A security system flags a routine system update as malicious, resulting in blocked downloads and wasted time investigating a benign file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Fileless malware

A

A hidden script leverages built-in command-line tools so nothing new is written to disk, making detection by traditional antivirus more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

File path

A

On a Windows system, something like D:\Projects\2025\Tasks.xlsx points directly to the spreadsheet’s exact location on that drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Filesystem Hierarchy Standard (FHS)

A

A Linux user places host settings in /etc and log files in /var/log, following the typical organizational approach many distributions uphold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Filtering

A

A team examining a large data table narrows down entries to a specific date range, rapidly isolating relevant information without manually scanning everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Final report

A

After investigating a ransomware outbreak, security leaders compile timelines, discovered root causes, and recommended improvements into one comprehensive document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Firewall

A

A protective barrier silently inspects passing data, discarding anything that doesn’t comply with safe usage rules, thus restricting malicious intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Float data

A

Financial calculations, such as interest rates, rely on decimal precision to avoid rounding errors that could add up significantly over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Foreign key

A

One table in a database references a unique identifier from another table, ensuring proper relationships and preventing mismatched records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Forward proxy server

A

A university sends all student web traffic through a single point, applying content filters or logging usage before forwarding the request to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Function

A

A chunk of reusable script might handle logging for an application, centralizing the process of writing consistent entries in a system log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Global variable

A

A file declares a configuration parameter accessible everywhere else in the code, impacting many functions that rely on that same setting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Graphical user interface (GUI)

A

A user navigates via buttons and icons on the screen, rarely typing commands and relying instead on visual elements to operate the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Hacker

A

A curious individual or group attempts to bypass standard defenses for various reasons, ranging from beneficial auditing to malicious sabotage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Hacktivist

A

A group targeting government websites defaces official pages in protest, merging technical break-ins with a socially or politically charged message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Hard drive

A

A physical storage medium in a desktop or laptop holds personal data, programs, and the operating system for quick retrieval until it fails or is replaced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Hardware

A

Physical building blocks like memory chips, CPUs, and circuit boards power digital functionalities; without them, software cannot run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Hash collision

A

An improbability occurs when two different inputs produce the same digital fingerprint, questioning the reliability of that hashing approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Hash function

A

A user’s password is converted into a one-way scrambled form for secure storage, preventing the original string from being casually retrieved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Hash table

A

A data structure uses a special formula to locate the right “bucket” quickly, allowing near-instant lookups even in large collections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

A clinic enforces strict access logs, encryption, and private record-keeping practices to avoid leaking patient details, aligning with mandated guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Honeypot

A

A decoy environment intentionally lures attackers, documenting every move so defenders can learn infiltration techniques without risking actual data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Host-based intrusion detection system (HIDS)

A

A single workstation runs a monitoring agent that checks for suspicious file changes, unauthorized ports opening, or unrecognized background services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Hub

A

In a simpler network setup, data frames sent in one port show up on all other ports, lacking the intelligence to route traffic only where needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Hypertext Transfer Protocol (HTTP)

A

When connecting to an unencrypted webpage, text flows in both directions, exposing content to anyone who intercepts the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

Web activity is protected by encryption, allowing login forms, personal messages, and financial info to traverse the internet with confidentiality intact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Identify (NIST core function)

A

A business systematically looks at digital assets, ranking those critical for operation and acknowledging associated hazards so they can be addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Identity and access management (IAM)

A

A system centralizes user logins, multi-factor checks, and role-based permissions, unifying how individuals prove who they are and what they can do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

IEEE 802.11 (Wi-Fi)

A

Wireless signals let laptops and phones communicate without cables, adhering to a set of standards that define speed, range, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Immutable

A

A text string in certain programming languages can’t be changed once created, forcing new copies whenever a character sequence is revised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Implement (NIST RMF)

A

An organization sets the chosen defenses in motion—deploying encryption, setting up intrusion monitoring, and recording official steps taken for auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Improper usage

A

A staff member uses company equipment to illegally download copyrighted media, violating the organization’s guidelines and introducing new liability concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Incident

A

A genuine crisis or near miss occurs—a compromised database or an attempted system hack—disrupting normal confidentiality, integrity, or availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Incident escalation

A

When frontline responders realize the scope of an infiltration is beyond their skill set, they shift the matter to senior investigators capable of deeper remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Incident handler’s journal

A

A crisis responder maintains detailed entries of commands run, files accessed, and system logs checked, ensuring a complete event history for post-mortem analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Incident response

A

A retailer’s website experiences customer card data theft, prompting an emergency plan: isolate impacted servers, remove malicious scripts, and inform stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Incident response plan

A

A formal guide lists roles, contact details, and step-by-step actions employees must follow as soon as a cybersecurity alarm sounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Inclusive operator

A

A piece of logic checks if an order meets or exceeds a quantity threshold to qualify for special pricing, capturing any boundary case that meets the requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Indentation

A

In certain languages, blocks are recognized by how many spaces precede each line, making visual formatting part of the language grammar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Index

A

Selecting the first element from a list relies on an integer offset, ensuring the program fetches precisely the desired item.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Indicators of attack (IoA)

A

Uninstalling security software followed by attempts to run questionable scripts reveals a possibly active intrusion in its early stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Indicators of compromise (IoC)

A

Unfamiliar connections at odd hours, unexpected user account creation, or unknown processes running highlight that something malicious might have happened.

174
Q

Information privacy

A

A user configures social media settings so only close friends can see personal updates, keeping random strangers out of those posts.

175
Q

Information security (InfoSec)

A

Protective measures include network segmentation, rigorous training, and careful auditing, aiming to safeguard a company’s digital environment and data lifeblood.

176
Q

Injection attack

A

Unsanitized user input leads to unintended commands executing in the backend database or system, often with results that compromise data integrity.

177
Q

Input validation

A

An application ensures that only numerical values are entered for age, eliminating problematic strings or code that could corrupt the database.

178
Q

Integer data

A

Inventory systems rely on whole numbers for items in stock, preventing confusion that might occur if decimals were mistakenly added to product counts.

179
Q

Integrated development environment (IDE)

A

A programmer edits code in a specialized tool that flags errors, autocompletes functions, and debugs logic to speed up the software creation cycle.

180
Q

Integrity

A

A file’s fingerprint changes if any part of it is altered, helping an organization verify whether stored data remains authentic and unmodified.

181
Q

Internal hardware

A

A tower case encloses the CPU, RAM, and motherboard, physically powering the operating system and user applications.

182
Q

Internal threat

A

A disenchanted employee with administrative privileges chooses to sabotage or steal critical resources, harming from the inside.

183
Q

Internet Control Message Protocol (ICMP)

A

When “pinging” a remote system, tiny echo requests and replies measure whether the system is reachable and how long it takes to respond.

184
Q

Internet Control Message Protocol flood (ICMP flood)

A

A wave of ping requests swamps a target machine, consuming its bandwidth or processing power and degrading performance for legitimate users.

185
Q

Internet Protocol (IP)

A

Each chunk of data traveling online uses a structured addressing system to navigate from sender to receiver, akin to mailing addresses.

186
Q

Internet Protocol (IP) address

A

A unique identifier, like 10.0.0.25, points traffic to the right device on a local or wide network, guiding packets to the correct location.

187
Q

Interpreter

A

A language environment reads each script instruction, translating it on the fly into actions that the computer performs immediately.

188
Q

Intrusion detection system (IDS)

A

A monitoring apparatus scrutinizes traffic, raising alarms if it observes any pattern matching known malicious footprints or unexpected anomalies.

189
Q

Intrusion prevention system (IPS)

A

Beyond just alerting, this protective layer blocks questionable data flows or halts processes deemed threatening.

190
Q

IP spoofing

A

Data packets appear to come from a trusted machine, tricking basic filters into believing the traffic is from a legitimate source.

191
Q

Iterative statement

A

A looping construct repeatedly executes a block of code, stepping through data or continuing until a specified stop condition is met.

192
Q

KALI LINUX™

A

A specialized environment loaded with scanning, exploitation, and forensic tools helps ethical testers identify and exploit security gaps to fix them.

193
Q

Kernel

A

A central coordinator in a system manages CPU time, memory allocation, and device interactions, ensuring user programs can run effectively.

194
Q

Key-value pair

A

Configuration settings might store serverHost=prodServer. The label points to the item, letting the application interpret that value whenever needed.

195
Q

Legacy operating system

A

A factory sticks with an older version of software because it relies on custom programs that break on modern platforms, risking exposure to unpatched flaws.

196
Q

Lessons learned meeting

A

After a social engineering success, the team convenes to analyze how they fell for the trick and to devise stronger policies or training to prevent repetition.

197
Q

Library

A

A pre-compiled bundle of code handles common tasks, letting developers reuse proven routines for file handling, network requests, or math computations.

198
Q

Linux

A

A widely adopted kernel powers countless variants, prized for its open nature and flexibility in server, desktop, and embedded environments.

199
Q

List concatenation

A

A script merges two collections—like [1, 2] and [3, 4]—into a new sequence, forming [1, 2, 3, 4] for unified data handling.

200
Q

List data

A

A user arranges a to-do list in code: [“Buy groceries”, “Email manager”, “Schedule checkup”], maintaining order for each upcoming task.

201
Q

Loader

A

A tiny agent infiltrates a machine. It waits for commands to pull the real malicious payload from a remote location when triggered.

202
Q

Local Area Network (LAN)

A

All computers, printers, and other devices in a small office are tied together, facilitating resource sharing and internal collaboration.

203
Q

Local variable

A

Inside a function, a short-lived name references a piece of data, disappearing after that function ends and freeing up resources.

204
Q

Log

A

Each time a user logs in or a critical system operation completes, a timestamped record is created, providing evidence for future analysis or audits.

205
Q

Log analysis

A

Security staff pour through thousands of recorded events, identifying hidden anomalies or patterns that might indicate malicious or unstable behavior.

206
Q

Logging

A

A service documents every transaction, state change, and error along the way, building a historical record for debugging and compliance.

207
Q

Logic error

A

A script calculates total sales incorrectly if an internal formula points to the wrong variable, producing no compiler alert but clearly flawed outcomes.

208
Q

Log management

A

A centralized platform gathers data from servers, firewalls, and applications into one place, ensuring important alerts and context aren’t missed.

209
Q

Loop condition

A

A repetition continues as long as a certain test remains true, controlling how many times a sequence of instructions executes.

210
Q

Loop variable

A

Counting from 0 to 9 in a loop requires a single placeholder that increments by 1 each cycle until hitting 10.

211
Q

Malware

A

Malicious software disrupts or quietly abuses systems for theft, destruction, or espionage, often hidden behind seemingly harmless files or links.

212
Q

Malware infection

A

Clicking a suspicious link results in destructive code spreading throughout the corporate network if not promptly contained.

213
Q

Media Access Control (MAC) address

A

Network adapters each hold a hardware identifier, typically unique worldwide, used for delivering messages at the link layer.

214
Q

Method

A

In a programming language, some objects come with built-in routines; for instance, a text string can be converted to uppercase with a quick call.

215
Q

Metrics

A

Website uptime, page loading speed, and error rates help measure the stability of digital services, guiding improvements and capacity planning.

216
Q

MITRE

A

Security pros reference a well-curated taxonomy that documents adversary methods, enabling consistent threat analysis and communication worldwide.

217
Q

Modem

A

A box at home translates signals from an internet provider into digital data that routers and computers understand, bridging external and local networks.

218
Q

Module

A

A set of Python code components might handle networking tasks; importing it provides direct access to pre-written, tested functionality.

219
Q

Monitor (NIST RMF)

A

After implementing defensive measures, a continuous watch ensures these safeguards remain effective and adjusts if new threats emerge.

220
Q

Multi-factor authentication (MFA)

A

A second verification—like a smartphone approval—thwarts attackers who might steal passwords but lack additional keys.

221
Q

nano

A

A simple text editor on Unix-like systems helps administrators modify configuration files quickly without advanced or complex features.

222
Q

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

A

An overarching structure helps businesses identify, protect, detect, respond, and recover, guiding strategic decisions around security practices.

223
Q

National Institute of Standards and Technology (NIST) Incident Response Lifecycle

A

After attackers strike, teams work through phases: readiness, detection, confinement, resolution, and a retrospective to strengthen future defenses.

224
Q

National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53

A

Government-affiliated guidance outlines baseline controls—from encryption policies to physical safeguards—to ensure standardized risk management.

225
Q

Network

A

Multiple machines communicate with each other or the internet, sharing files and resources, enabled by protocols and physical connections.

226
Q

Network-based intrusion detection system (NIDS)

A

A device on the subnet sees all passing data, checking patterns for signatures or anomalies that imply malicious attempts.

227
Q

Network data

A

A streaming service pushes video frames over the internet, sending a continuous flow of small units from its servers to each viewer.

228
Q

Network Interface Card (NIC)

A

The embedded or plug-in component letting a computer speak to others via Ethernet or Wi-Fi, effectively bridging software with physical signals.

229
Q

Network log analysis

A

Reviewing router or firewall records can reveal suspicious spikes in outbound traffic, unrecognized IPs, or repeated connection failures.

230
Q

Network protocol analyzer (packet sniffer)

A

A diagnostic tool captures raw data transmissions, helping engineers troubleshoot or security analysts confirm suspicious communications.

231
Q

Network protocols

A

A set of rules, such as TCP or UDP, define how information is packaged, addressed, transmitted, and received in a standardized manner.

232
Q

Network security

A

A retail chain enforces a specialized firewall, robust wireless encryption, and a segmented architecture, ensuring minimal unauthorized internal movement if one piece is compromised.

233
Q

Network segmentation

A

A manufacturing line keeps industrial control systems on a specialized internal subnet, protecting it from the corporate employee network and outside threats.

234
Q

Network traffic

A

Browsing, emails, file syncs, and video calls collectively form data flowing across connected devices, carrying content between points.

235
Q

Non-repudiation

A

A digitally signed message binds the identity of the sender, making it difficult to deny they originated the communication or transaction.

236
Q

Notebook

A

A scientist runs code, shows charts, and writes commentary in one interactive environment, making research steps transparent and reproducible.

237
Q

Numeric data

A

Whether it’s user age or the number of product items sold, storing numeric values ensures arithmetic or comparisons remain feasible.

238
Q

OAuth

A

A user logs into a third-party site via a large identity provider, granting only the specific info needed, never sharing the main password.

239
Q

Object

A

A structure in certain languages organizes data fields and related behaviors, offering a blueprint for advanced data manipulation.

240
Q

On-path attack

A

A hidden intermediary intercepts messages from both sides, reading or altering them before passing them along, unnoticed by sender or receiver.

241
Q

Open-source intelligence (OSINT)

A

Public digital footprints, like social media updates or posted code, can be aggregated to build a surprisingly detailed profile of a target.

242
Q

Open systems interconnection (OSI) model

A

A conceptual approach breaks network communication into layered steps, clarifying how data travels from hardware signals to application messages.

243
Q

Open Web Application Security Project (OWASP)

A

Developers consult influential guidance outlining the gravest pitfalls for web apps, ensuring they address common coding oversights.

244
Q

Operating system (OS)

A

A foundational layer coordinates hardware resources, memory, and application interfaces, enabling a smooth environment to run software.

245
Q

Operator

A

In a programming context, certain symbols manipulate variables—like + for arithmetic or == for comparison—shaping how data is handled.

246
Q

Options

A

Typing ls -a might display hidden files in addition to visible ones, altering the command’s behavior with extra flags.

247
Q

Order of volatility

A

In a forensics situation, data in live memory is collected first because it disappears upon shutdown, while logs on disks remain longer.

248
Q

OWASP Top 10

A

Engineers build web platforms with knowledge of frequently exploited coding mistakes—like cross-site scripting or SQL injection—aiming to dodge them.

249
Q

Package

A

A collection of modules in Python might come pre-organized for advanced math or data processing, installable in one step for broad functionality.

250
Q

Package manager

A

A maintenance tool tracks software dependencies, so installing one app automatically retrieves everything else it needs to function.

251
Q

Packet capture (P-cap)

A

An administrator records network transmissions to a file, enabling post-incident replay and detailed scrutiny of suspicious data flows.

252
Q

Packet sniffing

A

An observer at a public hotspot reads unencrypted traffic, gleaning emails or logins from unsuspecting users who connect without secure channels.

253
Q

Parameter (Python)

A

A function blueprint includes placeholders where real values plug in during execution, letting the same routine work for multiple inputs.

254
Q

Parrot

A

A specialized Linux variant includes built-in pentesting scripts and privacy utilities, favored by security researchers seeking a different environment from other well-known toolkits.

255
Q

Parsing

A

Software breaks raw lines of data into labeled fragments, making logs or user inputs structured and easier to analyze or transform.

256
Q

Passive packet sniffing

A

Someone taps into older hub-based networks, silently monitoring transmissions without injecting or altering any data, often going unnoticed.

257
Q

Password attack

A

Using stolen credentials or systematically guessing until a login works, a malicious party attempts to gain unauthorized account access.

258
Q

Patch update

A

Developers release a crucial fix after identifying a software bug that allows malicious code execution, urging immediate upgrades to block exploitation.

259
Q

Payment Card Industry Data Security Standards (PCI DSS)

A

An e-commerce site applies mandatory encryption for card details and strictly limits which employees may see sensitive transaction data to avoid regulatory penalties.

260
Q

Penetration test (pen test)

A

Ethical hackers thoroughly challenge an organization’s defenses, from external scanning to social engineering, sharing insights on vulnerabilities discovered.

261
Q

PEP 8 style guide

A

Python code readability improves when common formatting, naming, and spacing conventions are followed, enabling consistency among multiple developers.

262
Q

Peripheral devices

A

External attachments like printers or external hard drives expand a computer’s capabilities but must also be guarded against malicious tampering.

263
Q

Permissions

A

A user can only read a file on a shared drive, while another can both read and write, reflecting different privilege levels set by the system.

264
Q

Personally identifiable information (PII)

A

Details such as a full name, home address, or ID number can reveal someone’s identity, requiring careful protection to prevent misuse.

265
Q

Phishing

A

An employee receives a well-crafted email from what looks like an internal manager, urging them to follow a link and fill in a password.

266
Q

Phishing kit

A

A pre-packaged set of fake site templates and scripts is sold in hidden forums, letting amateurs launch impersonation campaigns easily.

267
Q

Physical attack

A

Somebody physically intrudes into an office’s server room, overriding electronic locks or tampering with cables to access data without leaving a digital trace.

268
Q

Physical social engineering

A

A newcomer tailgates behind someone else’s keycard-swipe entry, bypassing security by exploiting politeness or inattentiveness from the legitimate employee.

269
Q

Ping of death

A

An unusually large network echo request is dispatched, surpassing buffer limits on older systems, potentially crashing them outright.

270
Q

Playbook

A

A set of guidelines spells out the exact steps responders follow upon detecting ransomware, from isolating machines to contacting legal counsel.

271
Q

Policy

A

An organization insists that every device be updated monthly and no personal USB drives are allowed, forming part of official guidelines for daily work.

272
Q

Port

A

A listening post on a machine awaits certain kinds of traffic, distinguishing web server requests from remote login connections or email transmissions.

273
Q

Port filtering

A

A security layer blocks all traffic except for a few authorized channels, letting specific services like SSH or HTTPS pass while discarding the rest.

274
Q

Post-incident activity

A

After a malicious infiltration is resolved, the team revisits logs to learn from mistakes, refining processes for more robust prevention next time.

275
Q

Potentially unwanted application (PUA)

A

A seemingly legitimate tool also installs browser add-ons or displays persistent ads, frustrating users by diminishing device performance or collecting usage data.

276
Q

Private data

A

Personal diaries or non-public records deserve carefully restricted access, ensuring that unauthorized parties can’t read or share them.

277
Q

Prepare (NIST RMF)

A

An organization invests in staff training, architecture reviews, and tabletop drills, building readiness for future incidents and shaping early response strategies.

278
Q

Prepared statement

A

Developers craft database queries with placeholders, separating the command logic from any user input, thereby reducing injection risks.

279
Q

Primary key

A

A system ensures each record in a user table has an exclusive identifier, preventing duplicates and enabling direct referencing for lookups.

280
Q

Principle of least privilege

A

An assistant in finance sees only partial financial data needed for daily tasks, preventing access to entire budgets or confidential HR info.

281
Q

Privacy protection

A

A messaging platform conceals phone numbers and applies end-to-end scrambling so only the communicating parties can decipher the messages.

282
Q

Procedures

A

A medical practice outlines a step-by-step method for eliminating expired patient records, ensuring compliance and consistency in document destruction.

283
Q

Process of Attack Simulation and Threat Analysis (PASTA)

A

Security teams systematically model potential threats, evaluating each route an attacker might take, then building proportional defenses aligned with actual risk.

284
Q

Programming

A

A coder writes an automated script to compress logs every night, saving storage and making it simpler to retrieve historical data.

285
Q

Protect (NIST core function)

A

A business enforces strong authentication, firewall rules, and data encryption, forming the crucial layer to deter or slow intruders.

286
Q

Protected health information (PHI)

A

Medical test results, billing details, and prescriptions require extra safeguards, since leaking them can cause severe personal and legal repercussions.

287
Q

Protecting and preserving evidence

A

A forensic copy of a compromised drive is made, ensuring no changes occur to the original. This method validates the authenticity of findings for legal processes.

288
Q

Proxy server

A

All employee web traffic flows through an intermediate device that filters disallowed sites and logs activities, adding a corporate safeguard and usage oversight.

289
Q

Public data

A

A government agency posts open datasets of city traffic statistics, making them freely accessible for research and transparency.

290
Q

Public key infrastructure (PKI)

A

A chain of trust relies on recognized authorities that sign certificates, so web browsers automatically trust certain site credentials for encrypted sessions.

291
Q

Python Standard Library

A

Basic modules for tasks like file manipulation, system interaction, or date formatting ship with the environment, removing the need for many external packages.

292
Q

Query

A

A database request fetches all records of high-value customers who made purchases in a specific month, allowing refined analytics or marketing strategies.

293
Q

Quid pro quo

A

A scam phone call promises special IT support or freebies in exchange for user credentials, relying on the victim’s desire for quick help.

294
Q

Rainbow table

A

Precomputed cryptographic outputs for commonly used passwords speed up the unscrambling of poorly secured user logins.

295
Q

Random Access Memory (RAM)

A

When multiple applications run, they keep active data here for fast retrieval. Power loss wipes the contents, making it ephemeral but vital for performance.

296
Q

Ransomware

A

Malicious code silently encrypts crucial files, presenting a demand for money to unlock them; without backups, organizations face heavy disruption or data loss.

297
Q

Rapport

A

During a brief conversation, the interviewee connects over a shared interest with the interviewer, easing tension and fostering a more open dialogue.

298
Q

Recover (NIST core function)

A

A team reestablishes data and systems after a destructive breach, leaning on backups and carefully tested restoration steps to resume normal activities.

299
Q

Recovery

A

A hospital faced with a widespread encryption fiasco reverts to offline repositories and validated backups, bringing patient care systems back online in phases.

300
Q

Red Hat® Enterprise Linux®

A

An enterprise invests in a commercially supported variant with official updates, ensuring confidence in patches and timely vendor help for mission-critical tasks.

301
Q

Reflected XSS attack

A

A malicious parameter in a URL bounces back from the server into the user’s browser, triggering harmful scripts that steal sensitive details.

302
Q

Regular expression (regex)

A

A data-cleaning script uses a pattern to locate email addresses in unstructured text, standardizing them for consistent storage in a structured format.

303
Q

Regulations

A

A financial services firm abides by industry mandates, encrypting all card transactions and auditing staff access, or else faces penalties.

304
Q

Relational database

A

A reservation system links customer details, seat assignments, and payment records, ensuring consistent data across interconnected tables.

305
Q

Relative file path

A

A developer references ../images/header.png from a webpage in a subfolder, adjusting the location dynamically based on the page’s current directory.

306
Q

Replay attack

A

A previously valid login token gets captured and reused, fooling the system into thinking the user is logging in anew without fresh credentials.

307
Q

Resiliency

A

A multinational enterprise mirrors data in multiple geographic regions, so a local natural disaster can’t completely halt its services or cause total data loss.

308
Q

Respond (NIST core function)

A

An alert triggers immediate isolation of an infected machine, forensics to gauge damage, and patches or rule updates to counter the discovered threat.

309
Q

Return statement

A

A block of code processes input and finally hands back a computed outcome to the part of the program that requested it.

310
Q

Reverse proxy server

A

External site visitors connect first to an intermediate host. Requests are scrutinized or transformed before being forwarded to the actual web service inside the network.

311
Q

Risk

A

Leaving an admin console accessible to all internet users could lead to server control being seized. The probability of a breach multiplies if no restrictions are in place.

312
Q

Risk mitigation

A

A bank invests in second-factor authentication and frequent patching, reducing both the likelihood and impact of credential attacks or software flaws.

313
Q

Root directory

A

On certain systems, everything branches downward from a single top-level folder, forming the foundational structure of stored files and subfolders.

314
Q

Rootkit

A

Deep-level malicious modifications conceal themselves within the operating environment, letting intruders remotely control a system while hiding evidence from most detection.

315
Q

Root user (or superuser)

A

A powerful account holds complete authority to install packages, edit system files, or remove restrictions, requiring extra caution in daily use.

316
Q

Router

A

An intermediary piece of hardware inspects incoming messages, directing them to the correct device in a home or office network.

317
Q

Salting

A

Password hashing gains complexity through added random strings. Two users with the same passphrase end up with distinct stored values, preventing direct comparison.

318
Q

Scareware

A

Pop-ups shout that a user’s system is dangerously infected, pressuring them to buy a dubious cleanup tool that’s actually harmful or useless.

319
Q

Search Processing Language (SPL)

A

A specialized syntax surfaces from large log collections, letting operators quickly filter results—for example, focusing on 404 errors at certain timestamps.

320
Q

Secure File Transfer Protocol (SFTP)

A

Files transferred across networks are shielded by an encrypted tunnel, minimizing the chance that personal or proprietary data will be intercepted.

321
Q

Secure shell (SSH)

A

An admin safely logs into a remote server via an encrypted line, preventing potential eavesdroppers from grabbing sensitive credentials.

322
Q

Security architecture

A

A blueprint of layered defenses, segmented networks, and role-based policies shapes the organization’s protective design before systems are deployed.

323
Q

Security audit

A

External specialists review an organization’s setup, comparing current practices against best practices or mandated guidelines and identifying shortfalls.

324
Q

Security controls

A

Safeguards like encryption, multi-factor authentication, and content filtering collectively reduce the chances of successful system abuse.

325
Q

Security ethics

A

A junior specialist stumbles on unencrypted social security numbers in a log. Reporting the oversight responsibly aligns with moral and professional standards.

326
Q

Security frameworks

A

An organization systematically adopts recognized methods, ensuring comprehensive threat coverage rather than piecemeal patchwork solutions.

327
Q

Security governance

A

Executives shape the formal direction and oversight of protective measures, distributing responsibilities and verifying compliance across the enterprise.

328
Q

Security hardening

A

An administrator closes unused ports, removes default credentials, and applies the latest patches, reducing the number of possible openings for attackers.

329
Q

Security information and event management (SIEM)

A

A monitoring system collects logs from diverse sources, running correlation rules to detect potential intrusions in real time and alert staff.

330
Q

Security mindset

A

Developers ask, “How could someone misuse this?” as they design features, addressing vulnerabilities before attackers discover them.

331
Q

Security operations center (SOC)

A

Around-the-clock observers coordinate threat detection, analyzing anomalies, and initiating the response to incidents across the business.

332
Q

Security orchestration, automation, and response (SOAR)

A

A platform aggregates alerts, enriches them with intelligence, and triggers automatic isolation of suspicious endpoints, letting teams focus on deeper analysis.

333
Q

Security posture

A

A company invests in robust tools, continuous employee security drills, and thorough patching cycles, reflecting an advanced stance against emerging cyber threats.

334
Q

Security zone

A

Critical servers sit in a restricted network area, requiring robust authentication and minimal open ports, while public services reside in a less-trusted perimeter.

335
Q

Select (NIST RMF)

A

Risk evaluations lead a company to choose which protection measures—like mandatory encryption or advanced scanning—are most suitable to address documented hazards.

336
Q

Sensitive data

A

An app that stores government-issued IDs and personal addresses ensures encryption, restricting in-house staff’s access to only those who need it.

337
Q

Sensitive personally identifiable information (SPII)

A

Documents holding name, date of birth, plus driver’s license data form a risky combination that could lead to identity theft if leaked.

338
Q

Separation of duties

A

One clerk processes purchase orders while another signs off on final approval, limiting the power any single person wields over financial transactions.

339
Q

Session

A

While shopping online, the site remembers user-selected items across multiple page visits, storing a temporary context to tie everything together until checkout.

340
Q

Session cookie

A

A small identifier in the browser notifies the website which basket or user account is associated with each new request, disappearing after logout.

341
Q

Session hijacking

A

An adversary grabs a valid session token from an unprotected network, slipping into a user’s session without needing credentials again.

342
Q

Session ID

A

A random string is assigned when someone logs in, letting the server keep track of interactions tied to that user’s login phase.

343
Q

Set data

A

A programming variable collects distinct categories (like {"apples", "bananas", "cherries"}), ignoring repeated insertions to remain a unique set.

344
Q

Shared responsibility

A

A customer uses a major cloud service, with the provider securing data centers and hardware, while the customer must configure applications and manage user privileges.

345
Q

Shell

A

A text-based environment interprets typed commands for copying files, stopping processes, or changing system-wide settings on Unix-like or other platforms.

346
Q

Signature

A

An antivirus engine checks incoming files for known malicious byte patterns. If they match, the file is quarantined or deleted.

347
Q

Signature analysis

A

A detection device compares traffic to a database of recognized malicious footprints, triggering immediate warnings if it spots a match.

348
Q

Simple Network Management Protocol (SNMP)

A

Networking gear reports metrics—like CPU load or interface stats—to an overseeing console, aiding in performance monitoring and fault detection.

349
Q

Single sign-on (SSO)

A

A user enters login details once and seamlessly moves among various corporate apps without re-entering passwords each time.

350
Q

Smishing

A

A text on someone’s phone claims a big refund is waiting if they click a link. In reality, that link leads to a phishing site or malware-laden page.

351
Q

Smurf attack

A

Spoofed ping requests broadcast across a network cause a flurry of replies flooding back to the forged source, overwhelming it.

352
Q

Social engineering

A

Someone pretends to be tech support, coaxing a staff member into giving credentials. Exploiting trust bypasses even strong technical defenses.

353
Q

Social media phishing

A

Openly accessible posts about a user’s pet or recent vacation help fraudsters craft personalized lures that seem more convincing.

354
Q

Spear phishing

A

An email addresses its target by name, references their specific job role, and includes relevant office details, boosting credibility for the con.

355
Q

Speed

A

A consumer’s broadband plan allows an upper limit of megabits per second, shaping how quickly they can download or stream content.

356
Q

Splunk Cloud

A

A large entity sends event logs to a remotely managed analytics platform, relieving on-premises hardware constraints while gaining real-time threat visibility.

357
Q

Splunk Enterprise

A

Servers on the corporate network ingest logs into a local analysis system, letting administrators correlate data and trigger action from inside the firewall.

358
Q

Spyware

A

An unnoticed tool monitors keystrokes or web browsing habits, forwarding personal details to a hidden third party for data gathering or profit.

359
Q

SQL (Structured Query Language)

A

A standard approach to creating, reading, updating, or deleting structured records in a table-based storage system, widely used in back-end services.

360
Q

SQL injection

A

An input form without proper checks allows threat actors to slip in additional commands, reading or modifying data beyond normal authorization.

361
Q

Stakeholder

A

C-level executives, managers, and department leads each have vested interests in how a security initiative proceeds, influencing funding or acceptance.

362
Q

Standard error

A

A script’s mistakes and critical alerts flow to a separate output stream, ensuring they’re distinguished from normal results in logs or screens.

363
Q

Standard input

A

A user’s typed data or piped text enters a running process in real time, guiding or modifying how the program behaves.

364
Q

Standard output

A

Messages the program prints by default often appear on the screen, or are redirected to log files for future reference.

365
Q

Standards

A

An organization aligns its system configurations with recognized benchmarks, ensuring best-practice settings for everything from account lockouts to patch schedules.

366
Q

STAR method

A

In an interview, real-world examples are detailed step by step, discussing the situation, task, actions taken, and the final outcome to illustrate problem-solving in practice.

367
Q

Stateful

A

Traffic filtering logic that tracks ongoing communication sessions, allowing returning packets that match an established conversation while blocking the rest.

368
Q

Stateless

A

Every packet is filtered purely on rules without regard to prior context; each arrival is judged on its own, simplifying but reducing adaptability.

369
Q

Stored XSS attack

A

Unfiltered user input writes malicious scripts into a website’s database, which unsuspecting visitors execute when they load the compromised pages.

370
Q

String concatenation

A

Uniting "Hello " and "World" yields "Hello World", merging separate textual segments into a single phrase.

371
Q

String data

A

A variable carrying a password, city name, or comment text uses a sequence of characters, manipulated differently than numbers or booleans.

372
Q

Style guide

A

Company publications remain uniform by applying the same fonts, colors, and structural layouts, forming a consistent brand image across documents.

373
Q

Subnetting

A

A large corporate network breaks addresses into sub-ranges, fostering better organization, improved security boundaries, and efficient traffic handling.

374
Q

Substring

A

“From "Cybersecurity

375
Q

Sudo

A

A command typed with elevated rights on a Unix-based system grants temporary privileges to manage software or settings that are normally restricted.

376
Q

Supply-chain attack

A

Hackers tamper with a widely used software dependency, so thousands of unsuspecting enterprises install the compromised code in their own environments.

377
Q

Suricata

A

A network-level security tool compares live traffic with known malicious or suspicious signatures, optionally blocking the traffic or generating alerts.

378
Q

Switch

A

Data arrives on one port and is forwarded only to the correct destination port, lowering collisions and improving efficiency over old-school broadcasting methods.

379
Q

Symmetric encryption

A

Two parties share a single secret passphrase for both locking and unlocking messages, requiring trust that each keeps the key safe.

380
Q

Synchronize (SYN) flood attack

A

Machines flood a server with handshakes, never completing them, tying up resources and causing legitimate requests to languish or fail.

381
Q

Syntax

A

Coding instructions must adhere to grammar-like rules; missing a brace or semicolon often prevents the compiler or interpreter from proceeding.

382
Q

Syntax error

A

A script that forgets to close a bracket fails immediately, highlighting a structural mistake in the code’s layout.

383
Q

Tailgating

A

An outsider slips in behind an authorized staff member at a secured doorway, bypassing the requirement to scan or show personal credentials.

384
Q

TCP/IP model

A

A four-layer framework simplifies how data travels from physical signals to application-level transmissions, enabling universal compatibility across networks.

385
Q

tcpdump

A

An admin uses text-based capture to watch packets on an interface in real time, diagnosing slow connections or suspicious activity.

386
Q

Technical skills

A

Configuration of specialized security tools, programming response scripts, or analyzing logs are notable proficiencies vital in many IT and security roles.

387
Q

Telemetry

A

Endpoints forward usage patterns or threat alerts to a central system, helping IT staff see real-time status across the entire environment.

388
Q

Threat

A

A malicious group that actively scans for outdated software to exploit highlights the looming potential danger to unpatched hosts.

389
Q

Threat actor

A

A well-funded entity systematically develops advanced intrusion techniques, targeting governments or corporations with stealthy infiltration attempts.

390
Q

Threat hunting

A

Security experts proactively comb through logs, memory, and networks, unearthing malicious patterns that automated systems haven’t flagged yet.

391
Q

Threat intelligence

A

An organization receives updates on new phishing tactics or zero-day exploits from external feeds, adjusting defenses before direct attacks hit.

392
Q

Threat modeling

A

Developers brainstorm possible attacker motives, methods, and data targets, then incorporate design choices to reduce the worst risks upfront.

393
Q

Transferable skills

A

A nurse entering security can repurpose meticulous record-keeping, attention to detail, and high-stakes responsibility to excel in incident response and compliance.

394
Q

Transmission Control Protocol (TCP)

A

A stable connection ensures data arrives in the proper sequence, re-sending any lost segments to maintain accurate transfers.

395
Q

Triage

A

A flood of security alerts are sorted by priority, investigating the highest-risk incidents first to mitigate damage efficiently.

396
Q

Trojan horse

A

A disguised application claims to do a useful task but also installs a hidden backdoor, allowing remote infiltration behind the scenes.

397
Q

True negative

A

A scanning tool checks a system believed to be secure and finds nothing malicious. Subsequent inspections confirm the assessment was correct.

398
Q

True positive

A

An alert that certain inbound traffic is malicious proves accurate after investigation, preventing a potentially damaging infiltration.

399
Q

Tuple data

A

A small, fixed group of items is stored in a structure where elements can’t be replaced or reordered once established.

400
Q

Type error

A

An attempt to blend text with numerical expressions halts execution because the program expects consistent data formats for those operations.

401
Q

Ubuntu

A

A well-known system variant offers a user-friendly interface, community support, and stable updates suitable for desktops or servers.

402
Q

Unauthorized access

A

Someone logs into an area they lack rights for by using borrowed credentials, bypassing intended protections and potentially viewing or modifying data improperly.

403
Q

Uncontrolled zone

A

Everything beyond the internal firewalls is considered unpredictable or potentially hostile, requiring extra caution when exchanging data.

404
Q

Unified Extensible Firmware Interface (UEFI)

A

On newer machines, a more flexible approach than older boot routines decides hardware initialization, security checks, and the next steps in loading the OS.

405
Q

USB baiting

A

A flash drive labeled “Confidential Plans” left on a desk entices the curious, who inadvertently load the malicious code upon insertion into their workstation.

406
Q

User

A

Anyone interacting with a computer system, whether a front-desk clerk or an administrator, must be accounted for in security planning.

407
Q

User Datagram Protocol (UDP)

A

A quicker but less reliable method sends data without verifying every part arrived, often used in streaming or gaming scenarios.

408
Q

User-defined function

A

A piece of code an author writes for a specific purpose—like formatting reports—can be called multiple times from different parts of a program.

409
Q

User interface

A

A mobile app features clear icons and swipe gestures so individuals can accomplish tasks smoothly without learning complicated commands.

410
Q

User provisioning

A

When new staff join a company, automated steps set up accounts and privileges so they can start work immediately without manual overhead.

411
Q

Variable

A

A memory placeholder holds a changing piece of information, such as a running score, a user’s input, or a dynamic configuration value.

412
Q

Virtual Private Network (VPN)

A

Team members connect to corporate resources remotely through a secure tunnel, preventing unauthorized parties from spying on sensitive communications.

413
Q

Virus

A

Malicious code attaches to other files and spreads whenever they’re shared or executed, often harming data or system performance.

414
Q

VirusTotal

A

Security teams upload questionable files to a multi-engine scanning service, comparing results from different antivirus solutions for thorough checks.

415
Q

Vishing

A

An imposter calls, claiming urgent action from a bank or government office, hoping the target reveals private details like account pins or social security numbers.

416
Q

Visual dashboard

A

Managers see a real-time overview of server loads, security alerts, and user statistics without diving into raw logs or technical readouts.

417
Q

Vulnerability

A

A newly discovered flaw in a web plugin can allow someone to bypass login screens, potentially opening an unauthorized path into the site.

418
Q

Vulnerability assessment

A

Automated scans and manual checks reveal software weaknesses, insecure configurations, or missing patches, ranking them by severity for prioritization.

419
Q

Vulnerability management

A

A company methodically tackles found weaknesses by testing, applying updates, and monitoring for new issues, cycling through continuous improvement.

420
Q

Vulnerability scanner

A

Automated software references a database of known flaws, probing devices to see if they match any exploitable conditions or missing patches.

421
Q

Watering hole attack

A

A popular site frequented by a particular industry is sabotaged, hoping key professionals unknowingly install malicious code when they visit.

422
Q

Web-based exploits

A

Threat actors trick a user into clicking a harmful link or loading a compromised page, taking advantage of unpatched browser flaws to run code.

423
Q

Whaling

A

A high-level executive gets a customized extortion or wire-transfer scam referencing specific internal knowledge, aiming for a large payout from a single strike.

424
Q

Wide Area Network (WAN)

A

A corporation ties together branches across the country, enabling shared resources and communication despite physical distance.

425
Q

Wi-Fi Protected Access (WPA)

A

Modern wireless configurations require passphrases for encrypted sessions, significantly reducing eavesdropping or unauthorized usage of the network.

426
Q

Wildcard

A

A search parameter such as *.pdf matches any file name that ends with .pdf, simplifying broad retrieval or command operations on multiple files at once.

427
Q

Wireshark

A

An engineer inspects captured traffic data, identifying latency issues, protocol errors, or suspicious transmissions in a user-friendly graphical tool.

428
Q

World-writable file

A

Any user on a shared system can alter a particular resource, potentially enabling sabotage or the introduction of harmful scripts if not monitored.

429
Q

Worm

A

An automated malicious entity scans for vulnerabilities and copies itself, requiring no human interaction to leap from system to system.

430
Q

YARA-L

A

Security researchers define rule sets that scan files or logs for specific textual or behavioral patterns consistent with advanced malware families.

431
Q

Zero-day

A

A glitch in software is publicized before developers release an official fix, leaving users temporarily exposed to attackers exploiting the weakness.