Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Intro to cyber F2

QuestionAnswer
What principle protects information from unauthorized access? confidentiality
What term describes a secure, virtual network over public infrastructure? VPN
What are the three states of data? at rest in-process in-transit
What three design principles support high availability? Identify failures in real-time Ensure no critical component has only one point of failure Implement redundant or backup systems
What term describes alterations to original data, including manual modifications, processing changes, and system failures? modification
What three methods ensure system availability? up-to-date operating systems equipment maintenance system backups
What does the first dimension of the cybersecurity cube represent? goals
How are data accuracy and consistency ensured? (Choose two) hashing data consistency checks
What two approaches protect data secrecy? authentication encryption
What three objectives does a thorough security policy achieve? - provides management's endorsement and support for security measures - outlines penalties for non-compliance - establishes guidelines for acceptable conduct
What is the term for deceptive SMS messages that trick users into visiting malicious websites? smishing
What does the term "logic bomb" refer to? a program that activates harmful code when triggered
What are two weaknesses of the WEP protocol? The key is transmitted in clear text The key is static and repeats on a congested network
What type of attack involves intercepting data from nearby devices, as in the case of an attacker copying emails and contact lists outside a store? bluesnarfing
What does a rootkit alter? operating system
What is the term for a targeted email scam against a financial institution's employee? spear phishing
What is the term for fraudulent emails posing as legitimate sources? phishing
What two tactics do social engineers use to deceive targets into revealing sensitive information? urgency intimidation
What is the term for code that evades normal authentication? backdoor
What is the term for an attack exploiting SQL databases through user input fields? SQL injection
What two approaches ensure system uptime? up-to-date operating systems equipment maintenance
What term describes a storage device linked to a network? NAS
What type of laws safeguard your sensitive information from being shared by organizations? privacy
What type of malware demands payment in exchange for restoring access to user data? ransomware
How do viruses and worms differ? worms reproduce on their own, whereas viruses require a host.
What are the cybersecurity triad's three core elements? confidentiality integrity availability
What are three types of sensitive information? *** classified business PII (Personally Identifiable Information) ---------------------- PII classified declassified ------------------------- business pii declassified
What service controls user permissions and access levels? authorization
How can organizations safeguard against unintended modifications by authorized personnel? version control
What is the term for software used to gather information about a user's computer without their consent? spyware
What three methods confirm identity for authentication purposes? something you know something you have something you are
What is a method of sending information from one device to another using removable media? sneaker net
What type of software profits from displaying intrusive pop-ups? adware
What vulnerability enables script injection into users' web page views? Cross-site scripting
What are two widely used hash functions? MD5 SHA
What are two common indicators of spam mail? The email has no subject line. The email has misspelled words or punctuation errors or both
What three services does access control provide? Accounting authentication authorization
What are two ways to protect a computer from malware? Use antivirus software Keep software up to date
What happens when data exceeds a buffer's capacity? a buffer overflow
What are two common indicators of spam mail? The email has no subject line. The email has misspelled words or punctuation errors or both
What three services does access control provide? Accounting authentication authorization
What are two ways to protect a computer from malware? Use antivirus software Keep software up to date
What happens when data exceeds a buffer's capacity? a buffer overflow
Created by: jxxnixx
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards