暗記メーカー
ログイン
myra
  • Myra Mortal

  • 問題数 34 • 3/10/2024

    記憶度

    完璧

    5

    覚えた

    14

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    originates from a single source and aims to overwhelm a network or server.

    DoS attack

  • 2

    means that the client is unable to process the request

    408 request timeout

  • 3

    Ensuring that information security practices align with relevant laws, regulations, and industry standards.

    compliance

  • 4

    Ensuring that information is available and accessible to authorized users when need

    availability

  • 5

    Types of Cyber Attacks to Know

    1. DoS and DDoS 2. Social Engineering Attacks 3. DNS Spoofing 4. Man in the Middle Attack 5. Password Cracking 6. SQL Injection 7. Insider Threats 8. IoT Based Attacks 9. Malware

  • 6

    This refers to a general server-side error.

    500 Internal Server Error

  • 7

    type of cyber attack exploits mobile devices

    smishing

  • 8

    2 principles that governs information security programs

    non-repudiation authenticity

  • 9

    tells us that the server is currently offline

    503 service unavailable

  • 10

    means maintaining accuracy and completeness of data. This means data cannot be edited in an unauthorized way

    integrity

  • 11

    This error means that there’s something wrong with the server connection

    502 bad gateway

  • 12

    Planning and implementing strategies to maintain critical business functions during and after disruptions.

    business continuity

  • 13

    targets are conned into rerouting the destination

    diversion theft

  • 14

    means verifying that users are who they say they are and that each input arriving at the destination is from a trusted source

    authenticity

  • 15

    pose as someone’s friends or colleagues t

    spear phishing

  • 16

    Developing and implementing procedures to respond to and recover from security incidents.

    incident response

  • 17

    is a more intricate form of a DoS attack.

    DDoS attack

  • 18

    refers to servers side error

    504 gateway timeout

  • 19

    key aspects of it information assurance

    security management risk management business continuity compliance incident response

  • 20

    is a broader concept that encompasses not only the security aspects

    information assurance

  • 21

    involves luring potential targets

    baiting

  • 22

    also know as voice phishing

    vishing

  • 23

    means one party cannot deny receiving a message

    non-repudiation

  • 24

    means information is not disclosed to unauthorized individuals, entities, and processes.

    confidentiality

  • 25

    groups of computers all acting together

    botnets

  • 26

    Identifying, assessing, and managing risks to ensure the continuity and reliability of information.

    risk management

  • 27

    social engineering examples

    baiting diversion theft honeytrap phishing pretexting AI and deepfakes

  • 28

    attackers seduce their targets

    honeytrap

  • 29

    essentially an online deception

    social engineering attacks

  • 30

    referred to as cybersecurity, is the practice of protecting information from unauthorized access, disclosure, disruption, modification, or destruction.

    information security

  • 31

    information security are built 3 objectives

    confidentiality integrity availability

  • 32

    typically the sending of fraudulent

    phishing

  • 33

    , persuasion and observation to deceive and manipulate people so they reveal personal information about themselves, which can be used for fraudulent purposes.

    engineering attacks

  • 34

    The planning, implementation, and monitoring of security measures to protect information assets.

    security management