Drill #2 Flashcards

1
Q

data breach

A

release of secure information to an untrusted environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DoS attack

A

The attackers seek to make a computer or network unavailable by flooding the targeted system with unnecessary service requests, which overload the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security vulnerability

A

A weakness on a network, computer, or software which can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

exploit

A

Software or code—usually malicious—that takes advantage of a flaw or vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

zero-day

A

a vulnerability unknown to those who would be interested in securing it, which includes the good guys or the bad guys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

zero-day exploit

A

Also known as “zero-day attack,” is an exploit that takes advantage of a zero-day vulnerability on its first day of release, before the vendor knows about it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

advanced persistent threat

A

a network attack in which an unauthorized person stays there undetected for a long period of time and steals data, rather than cause damage to the network or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

tailgating

A

Also known as piggybacking, tailgating is a method used by bad guys to gain access to a building or other protected areas. A tailgater waits for an authorized user to open and pass through a secure entry and then follows right behind.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

keylogger

A

Malware or hardware that observes what someone types on their keyboard, which is then sent back to the bad guys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bitcoin

A

An independent digital currency that uses encryption to regulate the generation of units of currency and verify the transfer of funds.

independently of a central bank.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

money mule

A

A person recruited to quickly receive and turnaround funds involved in scams.

The person is often unaware of their role in the criminal act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly