Cyber Operations Flashcards
1
Q
Which pillar of cyber security is violated when a file is stolen?
A
Confidentiality.
2
Q
What is a firewall?
A
A firewall is a device or program that filters network traffic to control access to services.
3
Q
What are the three phases of a cyber-attack?
A
Reconnaissance, infiltration and maneuver, and exfiltration and maintaining access.
4
Q
What is malware?
A
Malicious software that violates one or more pillars of cyber security.
5
Q
What is a Trojan horse in cyber terms?
A
A program that appears benign but has hidden malicious functions.