google_cyberpunk_20240321024757 Flashcards

1
Q

Maleware

A

A software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A malware program that modifies their computer programs by inserting its own code to damage and/or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Malware that self - replicates spreading across the network and infecting computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

A malicious attack during which threat actors encrypt an organization’s data and demands payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A

Malicious software installed on a users computer without their permission, which is used to spy on and steal user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whaling

A

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business email compromise (BEC)

A

An attack in which a threat actor impersonates a known source to obtain a financial advantage

Example of: Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social media phishing

A

An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack

Example of: Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

An attack in which a threat actor compromises a website frequently visited by a specific group of users

Example of: Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

Example of: Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network

Example of: Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1 - Security and Risk Management

A

defining security goals and objectives, risk mitigation, compliance, business continuity, and the law

17
Q

2 - Asset Security

A

securing digital and physical assets

18
Q

3 - Architecture and engineering

A

optimizing data security by ensuring effective tools, systems, and processes are in place

19
Q

4 - Communication and network security

A

managing and securing physical networks and wireless communications

20
Q

5 - Identity and access management,

A

Identity and access management focuses on keeping data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications

21
Q

6 - Security assessment and testing,

A

conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities

22
Q

7 - Security operations, and software development security.

A

investigations and implementing preventative measures

23
Q

8 - Software development security.

A

Secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services.

24
Q

Antivirus software

A

A software program used to prevent, detect, and eliminate malware and viruses

25
Q

Security information and event management (SIEM)

A

An application that collects and analyzes log data to monitor critical activities in an organization

26
Q

Splunk

A

`A data analysis platform

27
Q

Chronicle

A

is a cloud-native SIEM tool that stores security data for search and analysis. Cloud-native means that Chronicle allows for fast delivery of new features.

28
Q

Network protocol analyzer (packet sniffer)

A

A tool designed to capture and analyze data traffic within a network

29
Q

chain of custody playbook

A

process of documenting evidence possession and control during an incident lifecycle

30
Q

protecting and preserving evidence playbook

A

properly working with fragile and volatile digital evidence

31
Q

order of volatility

A

a sequence outlining the order of data that must be preserved from first to last