Unit 1: Activities 1.1.1, 1.1.2,1.1.3, 1.1.4 Flashcards

1
Q

Social media

A

Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spam

A

Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

email source

A

The email address from which the email was sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

top-level domain

A

The last segment of a web address; it follows immediately after the last “dot” symbol (.com, .net, .org, .gov)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Software that is intended to do harm or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social engineering

A

Process by which an attacker gathers information, through social media or email, about a specific victim and plans a targeted cyber attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyberteam

A

A team of individuals working together to investigate cyber events and anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

team norms

A

Guidelines that team members develop in order to be followed when working together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Footprint

A

The trail that you leave behind when you engage in online experiences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virtual Machine

A

An emulation of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Crack

A

To guess or discover information, especially a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Python Script

A

A collection of Python code or commands that perform some function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Brute force attacks

A

An attempt to discover information through trial and error, guessing as many passwords as possible hoping one is correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictionary attack

A

A systematic attempt to crack a password testing with word and phrases found in online dictionaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encrypted

A

Human-readable text or data converted into a coded from.

17
Q

Algorithms

A

A set of steps to accomplish a task.

18
Q

File extension

A

The part of the filename that comes after the period, indicating the file type.

19
Q

Authorizes

A

To give permission, for example, in order to access information.

20
Q

Authenticate

A

To confirm your identity using knowledge known only to you or information interpreted by you.

21
Q

CAPTCHA

A

A system that can distinguish between a human and an automated program.