Revision Cards for Assessment

Beschreibung

Social Engineering Penetration Testing Denial of Service User Access Cipher Cipher
Aimee Morley
Karteikarten von Aimee Morley, aktualisiert more than 1 year ago
Aimee Morley
Erstellt von Aimee Morley vor mehr als 6 Jahre
5
0

Zusammenfassung der Ressource

Frage Antworten
What is social engineering? Social engineering is the art of manipulating people so they give up confidential information.
What do people try to get from social engineering? They try to get your passwords, bank information or try to access your computer so that they can install malicious software that gives them access to all your private details, such as passwords.
What is penetration testing? Penetration testing is an authorized stimulated attack on a computer system performed to evaluate the security of the system.
What is a denial of service attack? In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
What is the point of a denial-of-service (DoS) attack? Denial-of-service (DoS) attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them.
What is a user access levels? Access levels describe which URIs on the machine a group of users is permitted to read or modify.
What is a cipher? A cipher is a method of hiding words or text with encryption by replacing original letters with other letters, numbers and symbols through substitution or transposition. A combination of substitution and transposition is also often employed.
How do you work out a Caesar cipher? It is a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on. ABCDEFGHIJKLMNOPQRSTUVWXYZ XYZABCDEFGHIJKLMNOPQRSTUVW
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr