Topic 2 Flashcards

1
Q

Refers to malicious software designed to disrupt, damage or gain unauthorized access to systems

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware Prevention Methods

A

Regular Software Updates
Antivirus Software
Network Segmentation
Educate Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware Prevention Tools and Strategies

A

Patch Management Systems
Endpoint Detection and Response (EDR)
Regular Backups
Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Involves tricking individuals into providing sensitive information by pretending to be a trusted entity

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing Prevention Methods

A

Email Filtering
Employee Training
Verify Links and Senders
Multi-Factor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing Prevention Tools and Strategies

A

Email Security Gateways
Phishing Simulations
Zero Trust Access
Threat Intelligence Feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This threat exploits human psychology to manipulate individuals into divulging confidential information

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering Prevention Methods

A

Strict Access Control
Verify Requests
Awareness Programs
Incident Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering Prevention Tools and Strategies

A

Access management
Strong Internal Authentication
Verification Protocols
Social Engineering Defense Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Flaws or weaknesses in code that attackers can exploit to compromise systems, steal data, or gain unauthorized access

A

Software Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Buffer Overflow
Injection Flaws (SQL/Command injection)
Cross-Site Scripting (XSS)

A

SV - Common Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical Access Exploits
Side-Channel Attacks

A

Hardware Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Weaknesses in network protocols, configurations, or infrastructure that can lead to unauthorized access or data interception

A

Network Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Weak or Default Credentials
Man-in-the-Middle (MITM) Attacks
Unsecured Network Devices
Denial of Service (DoS) and Distributed Denial of Service (DDos Attacks:
Outdated or Insecure Protocols

A

NV - Common Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Overloading systems of networks to make them unavailable to legitimate users

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intercepting communication between two parties to eavesdrop or alter data

A

Man in the Middle (MITM) Attacks

17
Q

Cracking or steals passwords through brute force, dictionary, attacks, or keylogging

A

Password Attacks

18
Q

Exploiting software vulnerabilities before the vendor releases a patch

A

Zero-Day Exploits