Cyber Security Flashcards
understanding the internet and its dangers
What are the different layers of cyberspace?
Physical and Digital
__________ is another form of cyberbullying.
cyber trolling
Define the Internet.
A worldwide collection of different networks connecting millions of devices to allow communication between them.
What is cyber security?
The collection of security tools, policies, safeguard, and practices that protect the cyberspace environment and its occupants
Ethical Hacking
the act of performing penetration tests on a system or network to find loopholes and vulnerabilities that a malicious attacker can use to their advantage to cause loss or significant damages.
The following is NOT an example of cybercrime?
Sniffing
__________is created by data flowing between a user’s computer and the internet.
Online Usage
Which of the following is NOT characteristic of phishing attacks?
the sender is a family member or friend
To begin managing a digital footprint, users should do all the following EXCEPT:
keep all inactive accounts
Security specialists, technicians, and investigators are examples of ____________.
entry level positions
There are ____ common approaches for pursuing a career in cyber security.
2
___________ allow the website to temporarily store information throughout one session of visiting a website.
session cookies
_________ is the right to be free from being observed or disturbed by other people.
Privacy
Hackers accomplish a denial-of-service attack by
Flooding targeted machines with requests that overload the system
________ occurs when an attacker sends fraudulent emails or text messages to deceive someone into revealing personal information, such as passwords or credit card numbers.
Phishing
Using offensive language online would be considered __________.
Unethical
_________________is a form of harassment using electronic communication, with the intent of intimidating or threatening a person or group of people.
Cyberbullying
characteristics of the culture of computers, information technology, and virtual reality.
Cyber
___________can capture personal messages, banking information, phone numbers, and even passwords.
A keylogger