Finals 2 Flashcards

(33 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to_ the meaning of cyber attack is….

A

Practical law company, whitepaper cyber attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack initiated from a computer against a website

A

Cyber attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 distinct factors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reasons to hack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IRC MEANS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is an incident in which unauthorized hacker or attacker potentially views steals, or uses sensitive, protected or confidential data

A

Data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PHI MEANS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PII MEANS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSID MEANS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

REASONS FOR DATA BREACHES (2)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NON-MALICIOUS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

METHODS TO CRACK PASSWORD

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

run each and every word of dictionary

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Combination of the keystrokes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To trick the person through IM or emails

17
Q

The hacker maybe behind you when you type

18
Q

Based on the weakest link

A

Cyber security

19
Q

Various famous encryption techniques

20
Q

Insiders- disgruntled employees factors

21
Q

Types of employees(3)

22
Q

Outsiders

23
Q

Website vulnerabilities

24
Q

Attempt to use application code

25
Often used in conjunction
26
Forces a users session ID
27
Camouflage should be
28
Used to exploit dynamic file include
29
Brute force or?
30
Cross-site request forgery or?
One click attack
31
Intent of preventing a website
Denial of service
32
A direct object reference
33
Do not use appropriate encryption for sensitive information
Insecure