FQ3 Flashcards
What fraudulent practice of sending text messages purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords or credit card numbers?
Smishing
What are digital security tools that bridge the gap between users and the Internet, using filtering rules in line with an organization’s IT policies?
Proxies
What are set of characters that the originator of the data uses to convert the plaintext into a cipher or code, especially to prevent unauthorized access?
Encryption Key
What outlines the activities for which the computer and network may and may not be used?
Acceptable Use Policy
A set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
Back Doors
What group of compromised computers or mobile devices connected to a network, such as the Internet, used to attack other networks, usually for nefarious purposes?
Botnets
What security measure defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it?
Access Controls
What is the name of the group by Bashar al-Assad targeted opposition groups akin to a political protests by deploying or executing a DDOS attacks.
Syrian Electronic Army
This occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
IP Spoofing
This kind of backup is challenging to manage individual file backups. Least manageable of all the backup methods.
Selective Backup
Electronic evidence is a component of almost all criminal activities and this support is crucial for law enforcement investigations. What science focuses on identifying, acquiring, processing, analyzing, and reporting on data electronically?
Digital Forensic
It is also called symmetric key encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data?
Private Key Encryption
Which of the following is NOT an example of a biometric device?
voice
What is the process of converting data that is readable by humans into encoded characters to prevent unauthorized access?
Encryption
What technique do intruders use to make their network or Internet transmission appear legitimate to a victim’s computer or network?
Spoofing