Unit 1 Lesson 1 Flashcards

1
Q

Digital Footprint

A

the trail that you leave behind when you engage in online experiences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Security Cloud Lab

A

a virtual machine or simulated computer that runs on a host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virtual Machine

A

an emulation of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crack

A

to guess or discover information, especially a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Python script

A

a collection of Python code or commands that perform some function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brute force attack

A

an attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dictionary attack

A

a systematic attempt to crack a password testing with words and phrases found in online dictionaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

a process that converts human-readable text or data into a coded form. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Algorithm

A

a set of steps to accomplish a task. An algorithm can be expressed in many kinds of notation, such as natural language, pseudocode, and flowcharts. Algorithms are essential to the way computers process data, because they contain the specific instructions for what a computer or program does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authorize

A

to give permission, for example, in order to access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authenticate

A

to confirm your identity using knowledge known only to you or information interpreted by you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAPTCHA

A

a system that can distinguish between a human and an automated program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social media

A

websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spam

A

irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phisher

A

the person sending the phishing attempts

17
Q

Email source

A

the email address from which the email was sent

18
Q

Top-level domain

A

the last segment of a web address; it follows immediately after the last “dot” symbol (.com, .net, .org, .gov)

19
Q

Malware

A

software that is intended to do harm or damage

20
Q

Social engineering

A

gaining access to buildings, systems, or data by exploiting human psychology rather than by breaking in or using technical hacking techniques

21
Q

Cyberteam

A

a team of individuals working together to investigate cyber events and anomalies

22
Q

Team norms

A

guidelines that team members develop in order to be followed when working together