Common Cybersecurity Terminology Glossary
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary objective of an advanced persistent threat?

  • To exfiltrate information and undermine critical aspects. (correct)
  • To create blacklists for compromised systems.
  • To conduct random attacks on systems.
  • To perform security audits on organizations.
  • Which statement best describes an attacker?

  • An individual analyzing system vulnerabilities without malicious intent.
  • An organization conducting compliance audits.
  • A party who conducts detrimental activities with malicious intent. (correct)
  • A government entity enforcing cybersecurity policies.
  • What is a common purpose of an audit in cybersecurity?

  • To create blacklists of malicious entities.
  • To review and assess system controls for compliance. (correct)
  • To deploy advanced persistent threats.
  • To conduct unauthorized access attempts.
  • How does an advanced persistent threat typically behave?

    <p>It adapts to defenders’ efforts over time.</p> Signup and view all the answers

    What defines an attack signature?

    <p>A specific sequence indicative of unauthorized access attempts.</p> Signup and view all the answers

    What characterizes a blacklist in cybersecurity?

    <p>A list of entities that are blocked from access.</p> Signup and view all the answers

    Which of the following best describes an adversary in cybersecurity?

    <p>A group or individual conducting harmful activities.</p> Signup and view all the answers

    What is the main focus of an audit within the context of cybersecurity?

    <p>To review compliance with security policies and policies.</p> Signup and view all the answers

    What is the purpose of access control in cybersecurity?

    <p>To grant or deny requests for information and services</p> Signup and view all the answers

    What distinguishes an air gap in cybersecurity?

    <p>Physical disconnection with no automated logical connection</p> Signup and view all the answers

    What is the main purpose of digital forensics?

    <p>To collect and analyze data while preserving its integrity</p> Signup and view all the answers

    What characterizes an Advanced Persistent Threat (APT)?

    <p>Multiple attack vectors and significant resources</p> Signup and view all the answers

    What is the main function of antivirus software?

    <p>To monitor and prevent malware incidents</p> Signup and view all the answers

    Which of the following best describes an exploit?

    <p>A method to breach the security of a network</p> Signup and view all the answers

    How are access control mechanisms primarily utilized?

    <p>They detect and deny unauthorized access</p> Signup and view all the answers

    What does an indicator in cybersecurity represent?

    <p>A sign that an incident may have occurred or is occurring</p> Signup and view all the answers

    What does the term 'alert' refer to in a cybersecurity context?

    <p>A notification of a specific attack aimed at the organization</p> Signup and view all the answers

    Which of the following defines hacking?

    <p>An attempt to disrupt or manipulate information systems without authorization</p> Signup and view all the answers

    Which of the following best defines an asset in cybersecurity?

    <p>Any high impact program or critical system</p> Signup and view all the answers

    Which term refers to the integrated employment of information-related capabilities during military operations?

    <p>Information Operations (I/O)</p> Signup and view all the answers

    What is one of the roles of access control mechanisms?

    <p>To permit authorized user access only</p> Signup and view all the answers

    What does an information security policy encompass?

    <p>An aggregate of directives, regulations, and rules concerning information management</p> Signup and view all the answers

    What is the function of a firewall?

    <p>To detect and prevent unauthorized access to a secure computer</p> Signup and view all the answers

    Which of the following best describes a hash function?

    <p>A technique for preserving the integrity of data through encryption</p> Signup and view all the answers

    What is the primary purpose of a hash function?

    <p>To compute a numerical value representing the file or message</p> Signup and view all the answers

    What does information system resilience primarily refer to?

    <p>The ability to operate under adverse conditions and recover effectively</p> Signup and view all the answers

    What defines an incident in the context of information technology?

    <p>An occurrence jeopardizing the integrity or availability of a system</p> Signup and view all the answers

    Which of the following best describes an insider threat?

    <p>Authorized individuals posing a risk to the information system</p> Signup and view all the answers

    What is the primary focus of an incident response plan?

    <p>To provide documentation for managing security incidents</p> Signup and view all the answers

    Which component is NOT typically included in an information technology system?

    <p>Recreational devices</p> Signup and view all the answers

    What is a characteristic of hash values in data files?

    <p>They are unique identifiers for each file</p> Signup and view all the answers

    Which of the following best exemplifies an incident affecting information security?

    <p>A system experiencing a denial of service attack</p> Signup and view all the answers

    What is the primary intent of a program inserted covertly into a system?

    <p>To compromise the confidentiality, integrity, or availability of data</p> Signup and view all the answers

    What does multifactor authentication utilize to achieve authentication?

    <p>Two or more different factors</p> Signup and view all the answers

    Which of the following describes the purpose of port scanning?

    <p>To determine which ports on a system are open</p> Signup and view all the answers

    What does non-repudiation provide assurance of?

    <p>That both sender and recipient cannot deny having processed the data</p> Signup and view all the answers

    What is defined as an unauthorized entity from outside the domain perimeter?

    <p>Outside threat</p> Signup and view all the answers

    What is a private key used for in asymmetric cryptography?

    <p>To compute a digital signature</p> Signup and view all the answers

    Which of the following is a deceptive method to acquire sensitive personal information?

    <p>Phishing</p> Signup and view all the answers

    What are the three factors that can be used in multifactor authentication?

    <p>Something you know, something you have, something you are</p> Signup and view all the answers

    Study Notes

    Common Cybersecurity Terminology

    • Access: Refers to the ability to utilize information system resources effectively.
    • Access Control: Mechanism that grants or denies requests for information resources and entry to physical facilities.
    • Access Control Mechanism: Security safeguards created to detect unauthorized access and allow authorized access to information systems.
    • Advanced Persistent Threat (APT): Sophisticated adversaries using multiple attack vectors to infiltrate IT infrastructures for long-term objectives.
    • Adversary: Any individual, group, or organization intending to conduct harmful activities against information systems.
    • Alert: Notification that indicates a specific attack has been made against an organization’s information systems.
    • Antivirus Software: Programs designed to monitor systems for malware, detecting and preventing breaches.
    • Asset: Includes applications, systems, personnel, and other resources critical to operational function or impact.
    • Attack: An unauthorized attempt to access systems, seeking to compromise integrity, availability, or confidentiality.
    • Attack Signature: Unique sequence of events that signify an unauthorized access attempt.
    • Audit: Independent examination of records to evaluate and improve system controls and compliance.
    • Blacklist: A list of entities denied access or privileges based on established security policies.
    • Digital Forensics: Process of collecting and analyzing data while ensuring information integrity, crucial in investigations.
    • Firewall: Integrated systems that prevent unauthorized operations and access from external sources.
    • Hack: Unauthorized attempts to access and disrupt information systems.
    • Hacker: An individual who illegally accesses computer systems.
    • Hash Function: Algorithm that produces a unique numerical value, representing the content of a file or message for verification.
    • Incident: Any event that potentially harms the confidentiality, integrity, or availability of an information system.
    • Incident Handling: Strategies to mitigate violations of security policies effectively.
    • Incident Response Plan: Documentation outlining procedures for managing security incidents.
    • Insider Threat: A risk from authorized users that can cause harm to information systems.
    • Phishing: Deceptive techniques used to acquire sensitive information from individuals online.
    • Multifactor Authentication: Security process requiring two or more authentication factors to verify user identity.
    • Port: Interface on a computer that allows communications with external devices or networks.
    • Port Scanning: Technique to identify open ports and available services on a system.
    • Private Key: Cryptographic key used in asymmetric cryptography, essential for generating digital signatures.
    • Outside Threat: External unauthorized entities that pose a risk to information systems through various harmful actions.
    • Non-repudiation: Assurance that the sender and the recipient cannot deny processing data, ensuring accountability in communications.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on common cybersecurity terms with this comprehensive glossary quiz. Dive into important concepts like access, air gap, and more. Perfect for anyone looking to enhance their understanding of cybersecurity language.

    More Like This

    Use Quizgecko on...
    Browser
    Browser