Cybersecurity Double Test Flashcards

1
Q

What does the CIA Triad stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does IAM stand for?

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Keylogger

A

Tracks and records a user’s every keystroke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rainbow Table

A

Precomputed table of outputs of hash algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing

A

A way to encrypt; Can’t get output from input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a virtual machine?

A

A software emulation of a physical computer.
Ex: running Linux on windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ITE

A

Isolated Testing Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two types of UI

A

GUI and CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GUI

A

Graphical User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CLI

A

Command Line Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why CLI?

A

More efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is training employees to not make cyber errors?

A

Mitigating the Human Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSINT

A

Open Source Intelligence (ex. social media)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is identifying potential threats and analyzing risks?

A

Threat Modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encoding

A

Makes digital data understandable to humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encrypting

A

Used to make data secure, incoherent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What method cracks ciphers with no prior knowledge?

A

Frequency Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many possible shifts in Caesar Cipher?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is concealing info within a text or image?

A

Steganography

20
Q

Examples of Steganography?

A

Backward messaging, Revolution letter technique, unusual pattern within image

21
Q

How is the system secured?

A

Through system hardening

22
Q

Additional input added into a hash function, adds complexity

23
Q

Assuring data is only accessible to authorized individuals

A

Confidentiality

24
Q

Ensuring the accuracy of data

A

Reliability

25
Guarantees data is available when needed
Availability
26
Attack that uses the same password on multiple accounts
Password Spraying
26
Attack that utilizes personal/credential data of someone
Credential stuffing
27
Breach where an employee releases data
Insider Leak
28
Data breach through negligence
Unintended disclosure
29
Principle of least Priviledge
Giving people absolute minimum digital power they need to do their job
30
Used to verify integrity of data
Hashes
31
Fabricated scenarios to scam
Pretexting
32
Offering enticing items to scam
Baiting
33
Sensitive info for sensitive info scam
Quid Pro Quo
34
When you specifically are the target
Spear-phishing
35
Website impersonation phish
SEO Trojans
36
Redirect scams
Pop-up phishes
37
Phishing through text
Smishing
38
Phishing through voice call
Vishing
39
Attack where someone reads all traffic while on wi-fi
Man In The Middle
40
Hijack of DNS attack
Pharming
41
Spamming ips attack
Snowshoeing
42
Used to mitigate human factor
Zero trust strategy
43
Assigns numbers (evaluated from binary) to English characters
ASCII
44
Is hashing reversible?
nein