Week 1 Flashcards

1
Q

CIA

A

Conformation, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Keeping data accurate and untampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Keep data hidden. Only need to know basis for files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The information we have is readily accessible to those people that should have it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk

A

The possibility of suffering a loss in the event of an attack on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability

A

A flaw in the system that could be exploited to compromise the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

0-day vulnerability (zero day)

A

A vulnerability that is not known to the software developer or vendor, but is known to an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploit

A

Software that is used to take advantage of a security bug or vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

The possibility of danger that could exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker

A

Someone who attempts to break into or exploit a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attack

A

An actual attempt at causing harm to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Black hat hacker

A

Someone who exploits an vulnerability in a system for malicious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

White hat hacker

A

Someone who exploits an vulnerability in a system to alert the devs so they can fix it before someone tries to exploit it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

A type of malicious software that can be used to obtain your sensitive information, or delete or modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common types of malware

A

Viruses, worms, adware, spyware, Trojans, root kids, backdoors, botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adware

A

Software that displays advertisements and collects data

17
Q

Trojan

A

Malware that disguises itself as one thing but does something else

18
Q

Spyware

A

Malware meant to spy on you

19
Q

Keylogger

A

Common type of spy ware that’s used to record every keystroke you make

20
Q

Ransomware

A

Type of attack that holds your data or system hostage until you pay some sort of ransom

21
Q

Botnets

A

Designed to utilize the power of the internet connected machines to perform some distributed function

22
Q

Backdoor

A

A way to get into a system if the other methods to get into the system aren’t allowed

23
Q

Rootkit

A

A collection of software or tools that an Admin would use

24
Q

Logic bomb

A

Type of malware that’s intentionally installed

25
Q

DNS Cache Poisoning attack

A

Tricks a DNS server into accepting a fake DNS record that will point you to a compromised DNS server. Then it feeds you take DNS addresses when you try to access legitimate websites

It can spread to other networks

26
Q

Man in the middle attack

A

An attack that places the attacker in the middle of two hosts that think they’re communicating directly with each other

27
Q

Rogue AP

A

An access point that is installed on the network without the network administrator’s knowledge

A type of man in the middle attack

28
Q

Denial of Service (DoS) attack

A

An attack that tries to prevent access to a service for legitimate users by overwhelming the network or server

29
Q

Ping of death (POD)

A

A type of DoS attack where a malformed ping is sent to a computer. The ping is larger than what the internet protocol was made to handle, so a buffer overflow occurs, and this causes the system to crash and potentially allow the execution of malicious code

30
Q

Ping flood

A

Sends ICMP echo requests to a computer till it’s overwhelmed and taken down

31
Q

Distributed denial of service attack (DDoS)

A

A DoS attack using multiple systems

32
Q

Cross site scripting (XSS) attacks

A

A type of injection attack where the attacker can insert malicious code and target the user or the service

33
Q

Password attack

A

Utilize software like password-crackers that try and guess your password

34
Q

Social engineering

A

Am attack method that relies heavily on interactions with humans instead of computers

35
Q

Spoofing

A

A source is !masquerading around as something else

36
Q

Tailgating

A

Gaining access into a restricted area or building by following a real employee in