Midterm Flashcards

1
Q

Failing to change your mindset about cybersecurity

A

Laxity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1 reason your sensitive Personally Identifiable Information(PII) will be successfully breached at some point

A

Laxity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1 reason you will become an “Inadvertent Actor” withouth knowing

A

Laxity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacking groups whose mission is defined by their government

A

Nation state sponsored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The digital mafia

A

Cybercriminal Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Groups that hack in the name of a cause or political issue

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-Millions of individual users participate anonymously
-Main attack vector is Distributed Denial of Service (DDoS)

A

Hactivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

also known for breaching major databases containing sensitive personal information

A

Hactivist Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

individuals or organizations that send irrelevant or unsolicited messages over the Internet, typically to large numbers of users, for the purposes of advertising, phishing or spreadinh malware with the main intent of financial gain.

A

Spammer’s and Phisher’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

those who specifically target your social media profiles with the intent of taking over your account in order to masquerade as you.

A

Social Media Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Create a “trust factor” to make you open links to walfare

A

Social Media Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scam friends into disclosing their PII

A

Social Media Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

using the “trust factor” to spread malware to your entire friends list.

A

Social Media Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

those who deploy fake wireless access points that use no security (Open Wifi)

A

MitM Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacker can create exact replica’s of Banking Site’s to glean your financial info

A

MitM Threat Factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attacker can intercept, send and receive data never meant to be for them without either outside party knowing until it is too late

A

MitM Threat Factors

17
Q

an exceptionally savvy threat actor who is well versed in multiple hacking techniques

A

12 year old neighbor

18
Q

have been exposed to computer technology since birth

A

Gen-Z and Gen-Alpha

19
Q

Capable of creating new and unseen attack vectors aka Zero-Day attacks

A

12 year old neighbor

20
Q

Keep network security analysts employed

A

12 year old neighbor

21
Q

a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication

22
Q

typically carried out by email spoofing or instant messaging, it often directs users to enter personal information at a fake website, the look and feel of which are identical to the legitimate site

23
Q

what can u do for fake supports or updates

A

WINDOWS: Ctrl-Alt-Del–Task Manager
APPLE: Command-Option-Esc–Force quit menu

24
Q

alternate form of payment to cash, credit cards, and checks. Technology behind it allows u to send it directly to others without going through a 3rd party like bank. Using a crypto-wallet

A

Cryptocurrency

25
2 ways youre being attacked
via web browser-O/S agnostic via phishing/drive-by malware download-- O/S specific
26
What can you do when attacked
use good A/V solution- AVG/Symantec/Kapersky use malwarebytes Anti-Malware use adblocker plugins
27
millions of home computers connected together using a 3rd party client application
P2P (Peer to Peer Networks)
28
impossible to block by a firewall or router because it uses dynamic port configuration
P2P
29
drone like workers that carry out assigned tasks from inside a command and control channel
Bots
30
networks of many bots
Botnets
31
hack other sites using brute force techniques without your knowledge
Proxying
32
send out thousands of spam emails without user knowledge
Spoofing
33