• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CYBER SECURITY AWARENESS

Test Prep Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

CYBER SECURITY AWARENESS

FLASHCARDS

EXAM PREPARATION GUIDE | 35 ITEMS

Q:Technology

The application of scientific knowledge for making improvements in productivity

Q:Detection

The act or process of discovering, finding, or noticing something.

Q:Virus

a program that is designed to harm a computer by deleting data, ruining files, and that can spread secretly from on computer to another.

Q:SSDLC

secure system development life cycle is a framework defining security requirements that must be considered and addressed within every system development project

Q:Worm

A usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action

Q:Password Cracking

refers to various measures used to discover computer passwords.

Q:Digital

Of, relating to, or using data in the form of numerical digits.

Q:Spyware

computer software that secretly records information about the way you use your computer

Q:Social Engineering

The act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information

Q:Cybersecurity

Measures were taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.

Q:FIrewall

An integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer.

Q:Phishing

A scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers, which the scammers can use illicitly.

Q:Password

A secret series of numbers or letters that allows you to use a computer system.

Q:Pass phrase

A string of words and characters that you type in to authenticate yourself.

Q:Polices

A prescribed or proscribed course of action or behavior which is to be followed.

Q:Zombie

A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.

Q:Unpatched software

Software that hasn't had the latest security updates applied to it, making it vulnerable to attack.

Q:Adware

Computer software that is provided usually for free but contains advertisements.

Q:Footprinting (reconnaissance)

attack in which an intruder engages with the targeted system to gather information about vulnerabilities.

Q:Internet

An electronic communications network that connects computer networks and organizational computer facilities around the world.

Q:Malware

software designed to infiltrate or damage a computer system without the user's normal functioning.Q:https: A secure form of Hypertext Transfer Protocol (HTTP) that is used to exchange information between webpages or access information found on a webpage.

Q:Vulnerability

A weakness that can be accidentally triggered or intentionally exploited

Q:Patch

A software update inserted (or patched) into the code of of an executable program that fixes bugs, installs new drivers.

Q:PPSI

Personal, private or sensitive information is any information where unauthorized access, disclosure, modification, destruction or disruption of access to or use of such information could severely impact the State Entity, its critical functions, its employees, its customers, third parties, or citizens of New York.

Q:Incident Response

Manual and automated procedures used to respond to reported incidents (real or suspected), systems failures and errors, and other undesirable events.

Q:Awareness

Having or showing realization, perception, or knowledge.

Q:Standards

a level of quality, achievement that is considered acceptable or desirable

Q:Threat

A potential circumstance, entity or event capable of exploiting a vulnerability and causing harm

Q:Updates

To change (something) by including the most recent information

Q:Social Media

Forms of electronic communication in which users create online communities and share information, including photos, videos, and messages, etc.

Q:Procedures

A set of administrative instructions for implementation of a policy or standard

Q:Computer Infiltration

means unauthorized entering program code into computer system in order to perform undesired (often concealed) activities.

Q:SPAM

e-mail that is not wanted, e-mail that is sent to large numbers of people and that consists mostly of advertising

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Test Prep
Description:

CYBER SECURITY AWARENESS FLASHCARDS EXAM PREPARATION GUIDE | 35 ITEMS Q:Technology The application of scientific knowledge for making improvements in productivity Q:Detection The act or process of ...

UNLOCK ACCESS $11.99