Final Exam Flashcards

1
Q

Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PII is any information specific to an individual.

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites).

A

Cyberbullies/cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Methods individuals use to track, lure, or harass another person online.

A

Cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Web sites on the worldwide web with hazard conditions to cyber safety.

A

Risk Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An electronic mail message sent from one computer or mobile device to another computer or mobile device.

A

Electronic mail (e-mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of protecting a system and network against unintended or malicious changes or deletion of information

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The study of ethics pertaining to computers, covering we use them how we use them; this can affect individuals and society.

A

Cyber Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The act of circumventing or breaking past security boundaries.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person who engages in hacking

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ethical and law-abiding

A

White-hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

operates outside the law

A

Black-hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The avenue or path hacker uses to commit the attack.

A

Attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A malicious software code that is unleashed and attempts to perform its destructive content.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A attempt to steal, damage, or destroy data or computer system.

A

Cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Confidentiality
Integrity
Availability
Are the three underlying principles of data protection.

A

CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The condition of being private or secret

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Having important information in the state of being complete or uncorrupted

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Having access to information when you need it is known as

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This term refers to the weakness of an Asset that can be Exploited by one or more attackers

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Any event that has the potential to bring harm to an organization or individual.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The potential or loss or damage when a threat exploits a vulnerability

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A computer code intentionally written to cause some form of harm.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication

A

Phishing

26
Q

a third party trying to gain access to your systems by cracking a user’s password.

A

Password Attack

27
Q

A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to the Internet.

A

Denial-of-Service Attack (DDoS)

28
Q

a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

A

Ransomware

29
Q

What do we do with Ransomware?

A

We don’t pay because the hacker may not give you the info you need to get your file back and may try to force you to pay more money.

30
Q

Name 1 – 2 types of a cyber attack?

A

DDOS, Virus, Phishing

31
Q

This type of Password Attack has a third party trying to guess your password.

A

Brute Force Password Attack

32
Q

Examples of Confidentiality attacks

A

Hacking Encrypted Data, Man in the middle attacks

33
Q

Examples of Integrity attacks

A

Remotely controlling zombie system, Maliciously accessing servers and forging records

34
Q

Examples of Availability attacks

A

DOS/DDoS Attacks, Flooding a server with too many requests

35
Q

These two are a list common things you should NEVER do online.

A

share your password, Posting anything online that you do not want public

36
Q

What are the three key Goals of Security Measures in Cyber Security?

A

Prevent ,Detect, and Recover from a problem.

37
Q

Personal Skills used to communicate and work well with others is known as what?

A

Soft Skills

38
Q

In a few words define what is Risk sites?

A

Web sites on the worldwide web with hazard conditions to cyber/online safety

39
Q

True or False: The Purpose of Malware is found in its payload.

A

True

40
Q

Keylogger

A

Technology that tracks a user’s keystrokes on the keyboard

41
Q

Social Engineering

A

To Trick Someone into doing actions or giving up confidential information to hackers/people.

42
Q

Cookies

A

Small files saved on the computer for web browser and websites.

43
Q

True or False: Trusted Sites Create Cookie Policy that States if the site uses them and how they are being used.

A

True

44
Q

Trojan Horse

A

Malware hidden inside other Software that appears harmless.

45
Q

True or False: Remote Access Trojan is a malware that allows the hacker to embed a backdoor to gain administrative control over someone computer.

A

False

46
Q

Compliance

A

Following the rules or standards that has been established.

47
Q

Computer Fraud and Abuse Act (CFAA)

A

Deals with unauthorized access of computers.

48
Q

Electronic Communication and Privacy Act (ECPA)

A

Protects wire and electronic transmissions of data.

49
Q

Sarbanes-Oxley Act (SOX)

A

Prevents company executives from hiding or destorying electronic records from a minimum of five years.

50
Q

Gramm-Leach-Bliley Act (GLBA)

A

Ensures that financial businesses are protecting your private data.

51
Q

Health Insurance Portability and Accounting Act (HIPAA)

A

Protects Electronic Medical Records and Personal Health Information.

52
Q

Which of the following below are key sign to watch out for when dealing with Phishing.
Select all that apply

A

Spoofed Email Address, All Caps, Asking your for your PII

53
Q

What is the name of the Programing Language We use on replit.com?

A

Python

54
Q

True or False: 50% of websites online are safe.

A

False No place is 100% safe online.

55
Q

Dumpster Diving

A

One who goes digging through trash for useful information.

56
Q

Encryption

A

Data protection technique that includes changing information from its original form to disguised or encoded format

57
Q

Cipher

A

A tool used to change normal text into something that is unreadable and then turn back into readable text.

58
Q

Plaintext

A

Refers to any text that can be read or written.

59
Q

Ciphertext

A

Encoded message

60
Q

Virtual Machine

A

Runs a Actual operating system of physical computer.