Cybersecurity Chapter 9 Flashcards
15 Questions
100 Views

Cybersecurity Chapter 9 Flashcards

Created by
@DivineCopper

Questions and Answers

What does multifactor authentication require you to have a combination of?

  • Something you are (correct)
  • Something you see
  • Something you own (correct)
  • Something you know (correct)
  • A logical port is designed to fit a certain kind of cable connector.

    False

    Sending emails to lure people into revealing personal information is a technique known as phishing.

    True

    Firewalls use a process of _____ to assign IP addresses to devices internal to the network.

    <p>network address translation (NAT)</p> Signup and view all the answers

    Your Social Security number should never be shared on a website, in an email, or through messaging.

    <p>True</p> Signup and view all the answers

    An image (or system backup) saves what kinds of files?

    <p>applications, operating system and data files.</p> Signup and view all the answers

    What is a program that takes complete control of your computer without your knowledge called?

    <p>rootkit</p> Signup and view all the answers

    Viruses that load from USB drives left connected to computers when they are turned on are known as what?

    <p>boot-sector viruses</p> Signup and view all the answers

    Encrypting data is not an appropriate measure for mobile devices such as smartphones.

    <p>False</p> Signup and view all the answers

    What do hackers do?

    <p>illegally break into a computer or network.</p> Signup and view all the answers

    To create a ransomware attack, what is typically needed?

    <p>very little knowledge because they can use Ransomware as a Service sites.</p> Signup and view all the answers

    What process does antivirus software use to prevent infection by recording key attributes?

    <p>inoculation</p> Signup and view all the answers

    Virtual private networks make it just as secure to send information across a public network as it is on a secure private network.

    <p>True</p> Signup and view all the answers

    What can a surge protector do besides looking like just another power strip?

    <p>save your device if a voltage spike is sent through the electrical system.</p> Signup and view all the answers

    Why is a packet analyzer called a sniffer?

    <p>it captures and reads data inside each packet.</p> Signup and view all the answers

    Study Notes

    Multifactor Authentication

    • Combines three elements for security: something you know (like a password), something you are (biometric data), and something you own (like a security token).

    Logical Ports

    • Misconception: Logical ports are specifically designed for certain cable connectors. This statement is false.

    Phishing

    • A cyber technique where emails trick recipients into providing personal information.

    Firewalls and NAT

    • Firewalls utilize Network Address Translation (NAT) to assign IP addresses internally. This helps conceal devices from external hackers.

    Social Security Number Privacy

    • Important: Never share your Social Security number through websites, emails, or messaging as it can lead to identity theft.

    System Backups

    • Images or system backups store critical files, including applications, operating systems, and user data.

    Rootkits

    • A rootkit is a type of malware that allows unauthorized control of a computer unbeknownst to the user.

    Boot-Sector Viruses

    • These viruses activate from USB drives that remain connected during computer startup, posing significant security risks.

    Data Encryption on Mobile Devices

    • Contrary to some beliefs, encrypting data on mobile devices like smartphones is a best practice for security.

    Hackers

    • Individuals who illegally access computers or networks to exploit vulnerabilities.

    Ransomware Attacks

    • Minimal technical knowledge is required to execute ransomware attacks, as criminals can leverage Ransomware as a Service (RaaS) platforms.

    Antivirus Software and Inoculation

    • Antivirus programs prevent malware infections by monitoring file attributes and employing a technique referred to as inoculation.

    Virtual Private Networks (VPNs)

    • VPNs ensure that data transmission over public networks remains as secure as on private networks, safeguarding user information.

    Surge Protectors

    • A surge protector, appearing like a normal power strip, provides essential protection for devices against voltage spikes.

    Packet Analyzers

    • Also known as sniffers, packet analyzers capture and decode data packets, monitoring network activity for analysis.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on key concepts from Chapter 9 of the Cybersecurity course. This quiz covers important topics such as multifactor authentication, phishing techniques, and firewall functionality. Perfect for reinforcing your understanding and preparation for exams.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser