Cyber Security Flashcards

understanding the internet and its dangers

1
Q

What are the different layers of cyberspace?

A

Physical and Digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__________ is another form of cyberbullying.

A

cyber trolling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define the Internet.

A

A worldwide collection of different networks connecting millions of devices to allow communication between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cyber security?

A

The collection of security tools, policies, safeguard, and practices that protect the cyberspace environment and its occupants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethical Hacking

A

the act of performing penetration tests on a system or network to find loopholes and vulnerabilities that a malicious attacker can use to their advantage to cause loss or significant damages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The following is NOT an example of cybercrime?

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________is created by data flowing between a user’s computer and the internet.

A

Online Usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT characteristic of phishing attacks?

A

the sender is a family member or friend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To begin managing a digital footprint, users should do all the following EXCEPT:

A

keep all inactive accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security specialists, technicians, and investigators are examples of ____________.

A

entry level positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

There are ____ common approaches for pursuing a career in cyber security.

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___________ allow the website to temporarily store information throughout one session of visiting a website.

A

session cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ is the right to be free from being observed or disturbed by other people.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hackers accomplish a denial-of-service attack by

A

Flooding targeted machines with requests that overload the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ occurs when an attacker sends fraudulent emails or text messages to deceive someone into revealing personal information, such as passwords or credit card numbers.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using offensive language online would be considered __________.

17
Q

_________________is a form of harassment using electronic communication, with the intent of intimidating or threatening a person or group of people.

A

Cyberbullying

18
Q

characteristics of the culture of computers, information technology, and virtual reality.

19
Q

___________can capture personal messages, banking information, phone numbers, and even passwords.

A

A keylogger