Terms Flashcards

1
Q

Advanced Persistent
Threat (APT)

A

A nation-state actor or attacker who is supported or funded by a government to disrupt or compromise other government targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware

A

Software that can display, or download, multiple unwanted pop-up adverts on your device. These pop-ups can come in many forms, such as banners or videos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Antivirus

A

A type of software, also known as “anti-malware”, that’s used to prevent, detect, and remove malware from a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attacker

A

A malicious actor who aims to steal, change or destroy information within a computer system, or destroy or disable the system by exploiting its weaknesses. An attacker can be a nation-state, individual, group, or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Blue Team

A

Incident Responders who work within the security unit to identify, assess and respond to the intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

A type of network infected with malware that’s used to carry out cyberattacks in a remote environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Breach

A

An incident, or series of incidents, in which data, computer systems, or networks are compromised (accessed or affected) in an unauthorized way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bugs

A

An error or flaw is usually found within a computer, network, or hardware system. Bugs cause unexpected results and errors when using a device or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud

A

Where shared computer and storage resources are accessed as a service (usually online), instead of hosted locally on physical services. Resources can include infrastructure, platform, or software services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptocurrency

A

A digital currency that uses encryption techniques to secure and verify financial transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyberattacks

A

Malicious attempts to damage, disrupt or gain unauthorized access to computer systems, networks, or devices, via cyber means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybercrime

A

Criminal activities are carried out using computers or the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Red Team

A

Offensive security experts who try and attack an organization’s cybersecurity defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Penetration Testing

A

Also known as ethical hacking, the simulation of real-world cyber attacks to test an organization’s cybersecurity capabilities and expose vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Red Teaming

A

The act of systematically and rigorously (and ethically) identifying an attack path that breaches the organization’s security defense through real-world attack techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly