KnowBe4 Training Flashcards
36 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is Social Engineering?

  • A program that damages computer systems
  • Acquiring sensitive information through trustworthy sources
  • A type of phish in fishing
  • Manipulating people into performing actions (correct)
  • What is phishing?

    Attempting to acquire sensitive info by acting like a trustworthy source

    What is cyberheist?

    Incident in which organized crime penetrates a network to empty bank accounts

    What does HIPAA stand for?

    <p>Health Insurance Portability and Accountability Act</p> Signup and view all the answers

    What are utilities in computer software?

    <p>Apps designed to optimize or maintain a computer</p> Signup and view all the answers

    What is an OS?

    <p>Operating System</p> Signup and view all the answers

    What does the term platform refer to?

    <p>The environment in which software is executed</p> Signup and view all the answers

    What is a feature in software or hardware?

    <p>Characteristic of software/hardware</p> Signup and view all the answers

    What is a plugin?

    <p>Component that adds a specific feature to software</p> Signup and view all the answers

    What does SAAS stand for?

    <p>Software as a Service</p> Signup and view all the answers

    What is an API?

    <p>Application Programming Interface</p> Signup and view all the answers

    What is a console in computing?

    <p>Interface that manages and controls software</p> Signup and view all the answers

    What is a dashboard?

    <p>At a glance views of key info relative to a business objective</p> Signup and view all the answers

    What is a server?

    <p>Computer that manages access to centralized resources</p> Signup and view all the answers

    What is a protocol in computing?

    <p>Specific set of communication rules between computers</p> Signup and view all the answers

    What is HTTP?

    <p>Hypertext Transfer Protocol</p> Signup and view all the answers

    What is a white paper?

    <p>A report that describes how a technology or product solves a problem</p> Signup and view all the answers

    What is a whitelist?

    <p>List of trusted websites allowed access</p> Signup and view all the answers

    What is spear phishing?

    <p>Phishing attack that targets specific users</p> Signup and view all the answers

    What is a phishing attack surface?

    <p>Quantity of emails exposed on the internet</p> Signup and view all the answers

    What is phishing prone percentage?

    <p>Percentage of employees prone to click on phishing links</p> Signup and view all the answers

    What is vishing?

    <p>Phishing attacks committed using telephone calls</p> Signup and view all the answers

    What is smishing?

    <p>Phishing attacks committed using text messages</p> Signup and view all the answers

    What is email spoofing?

    <p>Altering email components to appear from a different sender</p> Signup and view all the answers

    What is a Trojan?

    <p>A program disguised as a harmless application</p> Signup and view all the answers

    What is a worm in computing?

    <p>Destructive program that moves through files or networks</p> Signup and view all the answers

    What is a virus?

    <p>A piece of code that copies itself and can corrupt systems</p> Signup and view all the answers

    What is malware?

    <p>Software intended to damage or disable computers</p> Signup and view all the answers

    What is a rootkit?

    <p>Software tools used by an attacker to hide malicious activity</p> Signup and view all the answers

    What is a botnet?

    <p>Malware that calls home for further instructions</p> Signup and view all the answers

    What is a data breach?

    <p>When confidential info is accessed by unauthorized individuals</p> Signup and view all the answers

    What is a DoS attack?

    <p>Flooding a server with false requests to crash it</p> Signup and view all the answers

    What is an exploit?

    <p>Software that takes advantage of a flaw or vulnerability</p> Signup and view all the answers

    What is a zero day?

    <p>Vulnerability discovered by threat actors before it becomes public</p> Signup and view all the answers

    What is a zero day exploit?

    <p>An exploit targeting a vulnerability that is not public</p> Signup and view all the answers

    What does APT stand for?

    <p>Advanced Persistent Threat</p> Signup and view all the answers

    Study Notes

    Key Concepts of Cybersecurity and Software

    • Social Engineering: Techniques aimed at manipulating individuals to divulge personal or confidential information.
    • Phishing: A fraudulent practice of acquiring sensitive information by impersonating a trustworthy entity through mass emails.
    • Cyberhesit: A cybercrime where organized groups infiltrate networks to illegally withdraw funds from bank accounts.

    Regulatory and Technical Terms

    • HIPAA: Legislation that ensures the privacy and security of individuals' health information.
    • Utilities: Software applications designed for computer analysis, configuration, optimization, or maintenance.

    Software Fundamentals

    • Operating System (OS): Essential software that manages computer hardware resources.
    • Platform: The environment in which software operates, affecting performance and user experience.
    • Feature: Distinct characteristics or capabilities associated with software or hardware.
    • Plugin: A supplementary component that enhances software functionality by adding specific features.

    Software Models and Interfaces

    • Software as a Service (SAAS): Subscription model for software where licenses have an expiration date.
    • Application Programming Interface (API): Defined methods that enable software systems to communicate with each other.
    • Console: User interface that facilitates the management and control of software applications.
    • Dashboard: A visual summary providing key performance indicators related to business goals.

    Network and Data Management

    • Server: A computer dedicated to managing access to shared resources within a network.
    • Protocol: Specific rules governing communications between computers.
    • Hypertext Transfer Protocol: A protocol for transmitting data over the internet, foundational to web functionality.

    Security Mechanisms

    • Whitelist: A curated list of trusted websites granted permissions to enhance online safety.
    • Spear Phishing: Custom phishing attacks aimed at specific individuals or organizations.
    • Phishing Attack Surface: The total number of emails exposed online, influencing vulnerability to phishing attacks.
    • Phish Prone Percentage: The proportion of employees susceptible to clicking on phishing links.

    Types of Phishing Attacks

    • Vishing: Phishing attempts conducted through telephone calls or VoIP.
    • Smishing: Phishing attacks executed via SMS messages.
    • Email Spoofing: Manipulation of email headers to make messages appear from a legitimate source.

    Malicious Software Types

    • Trojan: Malicious software disguised as legitimate applications that can cause harm.
    • Worm: A self-replicating program that spreads through networks and corrupts files.
    • Virus: Malicious code that replicates itself and can harm the system or data.
    • Malware: Broad category for software designed to harm or disrupt computer systems.
    • Rootkit: Tools deployed by attackers to conceal malicious software activity.
    • Botnet: Network of compromised computers under the control of a malicious party, awaiting commands.

    Cybersecurity Threats

    • Data Breach: Unauthorized access and distribution of sensitive or confidential information.
    • Denial of Service (DoS) Attack: Intentional flooding of a server with false requests to incapacitate services.
    • Exploit: Software designed to take advantage of system vulnerabilities.
    • Zero Day: A vulnerability known to attackers before it is disclosed publicly, often used for targeted attacks.
    • Zero Day Exploit: An attack utilizing a previously unknown vulnerability in software.

    Advanced Persistent Threats

    • Advanced Persistent Threat (APT): Long-term stealthy threat actors often state-sponsored that target specific entities for strategic purposes.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on key terms related to social engineering and cybersecurity with these flashcards. Each card provides a definition for important concepts like phishing and cyberheist. Perfect for enhancing your awareness and understanding of online security threats.

    Use Quizgecko on...
    Browser
    Browser