This type of cyber threat involves unauthorized access to a computer or network.
What is hacking?
What is the term for the process of verifying a user's identity?
What is authentication?
This is the process of converting data into an unreadable form to prevent unauthorized access.
What is encryption?
What is the term for the manipulation of individuals to divulge confidential information?
What is social engineering?
What is the first line of defense against unauthorized access to a network?
What is a firewall?
These malicious programs disguise themselves as legitimate software but carry out harmful actions.
What are trojans?
Enabling this feature on your smartphone helps protect it from unauthorized access. HINT It is unique to every individual
What is biometric authentication?
This policy specifies how long data should be retained and when it should be securely disposed of.
What is a data retention policy?
This social engineering attack involves creating a sense of urgency to prompt immediate action.
What is pretexting?
This security measure assigns unique identifiers to devices on a network to control their access.
What is MAC address filtering?
A distributed denial-of-service (DDoS) attack aims to disrupt a target's services by flooding it with what?
What is a massive volume of traffic?
VPN stands for what, which creates a secure connection over the internet?
What is Virtual Private Network?
What is the term for the process of removing data irreversibly so that it cannot be recovered?
What is data sanitization?
What is the term for a social engineering attack where an attacker masquerades as a legitimate entity?
What is impersonation?
This type of attack involves intercepting and altering communication between two parties.
What is a man-in-the-middle attack?
This type of cyber attack involves exploiting vulnerabilities in a system to gain unauthorized access or steal data.
What is exploitation?
What does a UTM appliance typically combine to provide comprehensive security for a network?
What is firewall, antivirus, intrusion detection, and content filtering?
What is the term for a technique used to validate the integrity and authenticity of a message?
What is a digital signature?
What is the psychological manipulation that exploits human behavior to bypass security measures?
What is a manipulation technique?
What is the term for the process of inspecting and filtering incoming and outgoing network traffic?
What is packet filtering?
In a zero-day exploit, attackers target vulnerabilities that are known to whom but not yet patched?
What is the software vendor?
What is the term for the practice of hiding sensitive information within less sensitive information?
What is steganography?
What is the cryptographic technique that ensures the authenticity and integrity of transmitted data?
What is HMAC (Hash-based Message Authentication Code)?
What is the term for a social engineering technique that involves gaining unauthorized access by exploiting human trust?
What is pretexting?
What is the cryptographic protocol that provides secure communication over a computer network?
What is SSL/TLS (Secure Sockets Layer/Transport Layer Security)?