Terms B Flashcards

1
Q

Baiting

A

A social engineering tactic that tempts people into compromising their
security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bandwidth

A

The maximum data transmission capacity over a network, measured by
bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseline configuration (baseline image)

A

A documented set of specifications within
a system that is used as a basis for future builds, releases, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bash

A

The default shell in most Linux distributions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Basic auth

A

The technology used to establish a user’s request to access a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Basic Input/Output System (BIOS)

A

A microchip that contains loading instructions for the computer and is prevalent in older systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Biometrics

A

The unique physical characteristics that can be used to verify a person’s
identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bit

A

The smallest unit of data measurement on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Boolean data

A

Data that can only be one of two values: either True or False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bootloader

A

A software program that boots the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Botnet

A

A collection of computers infected by malware that are under the control of a
single threat actor, known as the “bot-herder”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bracket notation

A

The indices placed in square brackets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Broken chain of custody

A

Inconsistencies in the collection and logging of evidence in the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Brute force attack

A

The trial and error process of discovering private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bug bounty

A

Programs that encourage freelance hackers to find and report
vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Built-in function

A

A function that exists within Python and can be called directly

17
Q

Business continuity

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

18
Q

Business continuity plan (BCP)

A

A document that outlines the procedures to sustain business operations during and after a significant disruption

19
Q

Business Email Compromise (BEC)

A

(BEC): A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage