Module 2 Flashcards

1
Q

Malware

A

A software designed to harm devices or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Malware that self-replicates, spreading across the network and infecting computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware

A

A malicious attack during which threat actors encrypt an organization’s data and demand payment to restore access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spyware

A

Malicious software installed on a user’s computer without their permission, which is used to spy on and steal user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whaling

A

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business email compromise (BEC)

A

An attack in which a threat actor impersonates a known source to obtain a financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social Engineering

A

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social media phishing

A

An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attack

A

An attack in which a threat actor compromises a website frequently visited by a specific group of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Certified Information Systems Security Professional (CISSP)

A

The Certified Information Systems Security Professional (CISSP) is a globally recognized certification in the field of information security. It’s designed for experienced security practitioners, managers, and executives. The certification is offered by the International Information System Security Certification Consortium, commonly known as (ISC)².