Lesson 6 - CyberSecurity and Networking Terms Flashcards

1
Q

What is Access Control Lists (ACLs)

A

A list of rules that specifies which users or systems are granted or denied access to a particular object or system resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Adware?

A

Automatic delivery and display of advertising material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Antivirus?

A

Software designed to detect, stop, and remove viruses and other kinds of malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Backdoors?

A

Secret or hidden methods of bypassing normal authentication to gain access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Baiting?

A

A type of social engineering attack that lures a victim into a trap with the promise of a reward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Blockchain?

A

A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Bugs?

A

Errors or faults in a program that produce incorrect or unexpected results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cyber Hygiene?

A

Practices and steps users take to maintain system health and
improve online security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Decryption?

A

The process of converting encrypted data back into its original
form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Encryption?

A

The process of converting data into a code to prevent
unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Firewall?

A

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Hashing?

A

A process that takes an input (or ‘message’) and returns a fixed-size string of bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Intrusion?

A

Unauthorized access to a digital network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Intrusion Detection System (IDS)?

A

A system designed to detect unauthorized
access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an Intrusion Prevention System (IPS)?

A

A system designed to prevent unauthorized access to or from a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an IP Address?

A

A unique string of numbers and/or letters that identifies a device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an IPv4?

A

An IP Addressing scheme that uses a 32-bit address space.

18
Q

What is an IPv6?

A

A newer IP Addressing scheme that uses a 128-bit address space.

19
Q

What is a Keyloggers?

A

Surveillance technology used to monitor and record each
keystroke typed on a specific computer’s keyboard.

20
Q

What is a MAC Address?

A

A hardware identification number that uniquely identifies
each device on a network.

21
Q

What is Microsegmentation?

A

A method of creating secure zones in data centers and
cloud deployments that allows companies to isolate workloads and secure them individually.

22
Q

What is Multi-Factor Authentication?

A

An authentication method in which a user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.

23
Q

What is a Network Address Translation (NAT)?

A

A method of remapping one IP address space into another by modifying network address information in the IP header of packets.

24
Q

What is an OSI Model?

A

A conceptual model that characterizes and standardizes the
communication functions of a telecommunication or computing system.

25
Q

What is Penetration Testing?

A

A simulated cyber attack against a system to check for
vulnerabilities.

26
Q

What is Phishing?

A

A technique used by hackers to obtain sensitive information by disguising as a trustworthy entity.

27
Q

What is Pretexting?

A

A type of social engineering where attackers focus on creating a good pretext, or a fabricated scenario, that they can use to try and steal their victims’ personal information.

28
Q

What are Privileges?

A

The access rights or permissions that a user has to a computer or network.

29
Q

What are Program Flaws?

A

Errors or defects in a software program that can expose it to
possible exploitation.

29
Q

What is a Public Key Infrastructure (PKI)?

A

A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

30
Q

What is Ransomware?

A

A type of malicious software designed to block access to a
computer system until a sum of money is paid.

31
Q

What is a Router?

A

A device that forwards data packets along networks.

32
Q

What is Scareware?

A

A type of malware designed to trick victims into buying and
downloading unnecessary and potentially dangerous software.

33
Q

What is Social Engineering?

A

Techniques used by attackers to manipulate individuals
into divulging confidential or personal information.

34
Q

What is Software-Defined Networking (SDN)?

A

An approach to network management that enables dynamic, programmatically efficient network configuration.

35
Q

What is Spyware?

A

Software that secretly gathers user information through the user’s internet connection without their knowledge.

36
Q

What is Tailgating?

A

When an unauthorized person follows an authorized person into a restricted area or system without the consent or knowledge of the authorized person.

37
Q

What are “Trojan Horses” in Tech?

A

Malicious programs that misrepresent themselves to appear
useful, routine, or interesting in order to persuade a victim to install it.

38
Q

What is User Identification?

A

Unique representation of a user (like a username) on a
system.

39
Q

What is a VPN (Virtual Private Network)?

A

A secured private network connection built on top of a public network to protect and encrypt data.

40
Q

What are Viruses?

A

A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.

41
Q

What is a Zero Trust Model?

A

A security concept centered on the belief that
organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.