General Concepts Flashcards

1
Q

IP Address

A

A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port

A

A communication endpoint on a computer or network device, used to identify a specific process or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet Sniffing

A

A method of monitoring and analyzing network traffic to detect and extract sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

A type of social engineering attack in which an attacker attempts to trick a victim into providing sensitive information, such as login credentials or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL Injection

A

A type of cyber attack in which an attacker injects malicious code into a website’s SQL database, allowing them to gain unauthorized access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Man-in-the-middle (MitM)

A

A type of cyber attack in which an attacker intercepts and alters communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS

A

A type of cyber attack in which an attacker uses a network of infected computers to flood a website or online service with traffic, causing it to become unavailable to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

Software specifically designed to harm or exploit a computer system, such as viruses, trojans, and ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkit

A

A type of malware that is designed to conceal its presence on a system and provide an attacker with unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public Key Cryptography

A

A method of encrypting and decrypting data using a pair of mathematically-related keys, one of which is public and the other is private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSH

A

A secure network protocol used to remotely access and manage network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerability Scanning

A

The process of identifying potential vulnerabilities in a computer system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Engineering

A

A type of cyber attack in which an attacker uses psychological manipulation to trick a victim into providing sensitive information or performing a certain action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Botnet

A

A network of infected computers controlled by an attacker, used to launch DDoS attacks or other malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Keylogger

A

A type of malware that records every keystroke made on a computer, allowing an attacker to steal login credentials and other sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption

A

The process of converting plaintext into ciphertext, making it unreadable to anyone without the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Firewall

A

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

18
Q

Two-Factor Authentication

A

A method of confirming a user’s claimed identity by requiring them to present two or more pieces of evidence.

19
Q

Zero-Day Exploit

A

A type of cyber attack that takes advantage of a previously unknown vulnerability in a computer system or software.

20
Q

Advanced Persistent Threat (APT)

A

A type of cyber attack in which an attacker establishes a long-term presence on a target’s network with the goal of stealing sensitive information or causing damage over an extended period of time.

21
Q

Remote Access Trojan (RAT)

A

A type of malware that allows an attacker to remotely control an infected computer.

22
Q

Denial of Service (DoS)

A

A type of cyber attack that aims to make a computer resource unavailable to its intended users by overwhelming it with traffic.

23
Q

Cross-Site Scripting (XSS)

A

A type of cyber attack that injects malicious code into a website, allowing an attacker to steal sensitive information from users.

24
Q

Cross-Site Request Forgery (CSRF)

A

A type of cyber attack that tricks a user into performing an action on a website without their knowledge or consent.

25
Q

File Inclusion Vulnerability

A

A type of vulnerability that allows an attacker to include a file on a web server, potentially allowing them to execute malicious code.

26
Q

Password Cracking

A

The process of attempting to gain unauthorized access to a computer system by guessing or cracking a user’s password.

27
Q

Email Spoofing

A

A type of cyber attack in which an attacker sends an email that appears to be from a legitimate sender in order to trick the recipient into providing sensitive information.

28
Q

Network Mapping

A

The process of creating a visual representation of a network’s structure and topology.

29
Q

Distributed Denial of Service (DDoS)

A

A type of cyber attack that uses a network of infected computers to overwhelm a website or online service with traffic, making it unavailable to legitimate users.

30
Q

Clickjacking

A

A type of cyber attack that tricks a user into clicking on a button or link that they did not intend to click on.

31
Q

Advanced Encryption Standard (AES)

A

A widely-used standard for encrypting and decrypting data, known for its strong security and high performance.

32
Q

Virtual Private Network (VPN)

A

A private network that uses a public network to securely connect remote users and devices.

33
Q

Network Segmentation

A

The process of dividing a network into smaller, isolated segments in order to improve security and reduce the impact of a cyber attack.

34
Q

Buffer Overflow

A

A type of cyber attack that exploits a vulnerability in a computer program by overflowing its buffer, allowing an attacker to execute malicious code.

35
Q

Internet of Things (IoT)

A

The interconnection of everyday devices and appliances that are connected to the internet, allowing them to collect and share data.

36
Q

Backdoor

A

A type of cyber attack that creates a hidden way for an attacker to gain unauthorized access to a computer system or network.

37
Q

Exploit Kit

A

A collection of tools and techniques used to exploit vulnerabilities in computer systems and networks.

38
Q

Root Access

A

The highest level of access to a computer system, allowing a user to perform any action on the system.

39
Q

End-to-End Encryption

A

A method of encrypting data that ensures only the sender and the intended recipient can read the message, not even the service provider can access.

40
Q

Advanced Persistent Threats (APT)

A

A type of cyber attack that establishes a long-term presence on a target’s network with the goal of stealing sensitive information or causing damage over an extended