click below
click below
Normal Size Small Size show me how
Final Exam
Cyber Security Final Exam
Question | Answer |
---|---|
Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting). | Netiquette |
PII is any information specific to an individual. | Personally Identifiable Information (PII) |
Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites). | Cyberbullies/cyberbullying |
Methods individuals use to track, lure, or harass another person online. | Cyberstalking |
Web sites on the worldwide web with hazard conditions to cyber safety. | Risk Sites |
An electronic mail message sent from one computer or mobile device to another computer or mobile device. | Electronic mail (e-mail) |
A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control. | Password |
The process of protecting a system and network against unintended or malicious changes or deletion of information | Cybersecurity |
The study of ethics pertaining to computers, covering we use them how we use them; this can affect individuals and society. | Cyber Ethics |
The act of circumventing or breaking past security boundaries. | Hacking |
A person who engages in hacking. | Hacker |
ethical and law-abiding. | White-hat hacker |
operates outside the law. | Black-hat hacker |
The avenue or path hacker uses to commit the attack. | Attack vector |
A malicious software code that is unleashed and attempts to perform its destructive content. | Virus |
A attempt to steal, damage, or destroy data or computer system. | Cyberattack |
Confidentiality Integrity Availability Are the three underlying principles of data protection. | CIA triad |
The condition of being private or secret | Confidentiality |
Having important information in the state of being complete or uncorrupted | Integrity |
Having access to information when you need it is known as. | Availability |
This term refers to the weakness of an Asset that can be Exploited by one or more attackers | Vulnerability |
Any event that has the potential to bring harm to an organization or individual. | Threat |
The potential or loss or damage when a threat exploits a vulnerability | Risk |
A computer code intentionally written to cause some form of harm. | Malware |
fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication | Phishing |
a third party trying to gain access to your systems by cracking a user’s password. | Password Attack |
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to the Internet. | Denial-of-Service Attack (DDoS) |
a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. | Ransomware |
What do we do with Ransomware? | We don’t pay because the hacker may not give you the info you need to get your file back and may try to force you to pay more money. |
Name 1 – 2 types of a cyber attack? | DDOS, Virus, Phishing |
This type of Password Attack has a third party trying to guess your password. | Brute Force Password Attack |
Examples of Confidentiality attacks | Hacking Encrypted Data, Man in the middle attacks |
Examples of Integrity attacks | Remotely controlling zombie system, Maliciously accessing servers and forging records |
Examples of Availability attacks | DOS/DDoS Attacks, Flooding a server with too many requests |
These two are a list common things you should NEVER do online. | share your password, Posting anything online that you do not want public |
What are the three key Goals of Security Measures in Cyber Security? | Prevent ,Detect, and Recover from a problem. |
Personal Skills used to communicate and work well with others is known as what? | Soft Skills |
In a few words define what is Risk sites? | Web sites on the worldwide web with hazard conditions to cyber/online safety |
True or False: The Purpose of Malware is found in its payload. | True |
Keylogger | Technology that tracks a user’s keystrokes on the keyboard. |
Social Engineering | To Trick Someone into doing actions or giving up confidential information to hackers/people. |
Cookies | Small files saved on the computer for web browser and websites. |
True or False: Trusted Sites Create Cookie Policy that States if the site uses them and how they are being used. | True |
Trojan Horse | Malware hidden inside other Software that appears harmless. |
True or False: Remote Access Trojan is a malware that allows the hacker to embed a backdoor to gain administrative control over someone computer. | False |
Compliance | Following the rules or standards that has been established. |
Computer Fraud and Abuse Act (CFAA) | Deals with unauthorized access of computers. |
Electronic Communication and Privacy Act (ECPA) | Protects wire and electronic transmissions of data. |
Sarbanes-Oxley Act (SOX) | Prevents company executives from hiding or destroying electronic records from a minimum of five years. |
Gramm-Leach-Bliley Act (GLBA) | Ensures that financial businesses are protecting your private data. |
Health Insurance Portability and Accounting Act (HIPAA) | Protects Electronic Medical Records and Personal Health Information. |
Which of the following below are key sign to watch out for when dealing with Phishing. Select all that apply | Spoofed Email Address, All Caps, Asking your for your PII |
What is the name of the Programing Language We use on replit.com? | Python |
True or False: 50% of websites online are safe. | False No place is 100% safe online. |
Dumpster Diving | One who goes digging through trash for useful information. |
Encryption | Data protection technique that includes changing information from its original form to disguised or encoded format |
Cipher | A tool used to change normal text into something that is unreadable and then turn back into readable text. |
Plaintext | Refers to any text that can be read or written. |
Ciphertext | Encoded message |
Virtual Machine | Runs a Actual operating system of physical computer. |