cyber attacks and threats Flashcards
(23 cards)
What is a cyber attack?
A cyber attack is a malicious attempt to damage, disrupt, or gain unauthorized access to computer systems, networks, or devices.
True or False: Cyber threats only come from external sources.
False: Cyber threats can come from both external and internal sources.
Fill in the blank: A ______________ is a type of cyber attack where attackers try to overwhelm a system with traffic.
DDoS attack
What is phishing?
Phishing is a type of cyber attack that uses deceptive emails or websites to trick individuals into providing sensitive information.
Multiple Choice: Which of the following is a common type of malware? A) Firewall B) Trojan C) VPN
B) Trojan
What is the purpose of ransomware?
Ransomware encrypts a victim’s files and demands payment for the decryption key.
True or False: All cyber attacks are financially motivated.
False: While many cyber attacks are financially motivated, others may be politically or ideologically driven.
What does the term ‘zero-day vulnerability’ refer to?
A zero-day vulnerability is a security flaw that is unknown to the software vendor and has no patch available.
Multiple Choice: Which of the following is a method used to protect against cyber attacks? A) Antivirus software B) Ignoring updates C) Using weak passwords
A) Antivirus software
What is social engineering in the context of cyber threats?
Social engineering is the psychological manipulation of people into divulging confidential information.
Fill in the blank: A __________ is a program that replicates itself to spread to other computers, often causing harm.
virus
What is the main goal of a denial-of-service (DoS) attack?
The main goal of a DoS attack is to make a network service unavailable to its intended users.
True or False: Cybersecurity is only the responsibility of IT departments.
False: Cybersecurity is everyone’s responsibility within an organization.
What is a botnet?
A botnet is a network of infected computers that are controlled remotely by an attacker to perform coordinated tasks.
Multiple Choice: What is the best practice for creating a strong password? A) Use your name B) Use a mix of letters, numbers, and symbols C) Use the same password for all accounts
B) Use a mix of letters, numbers, and symbols
What is the role of a firewall in cybersecurity?
A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Fill in the blank: Cyber __________ refers to the potential for loss or harm related to technical infrastructure or the use of technology.
risk
What is a vulnerability assessment?
A vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
True or False: Cyber threats cannot be mitigated.
False: Cyber threats can be mitigated through various security measures and best practices.
What is the difference between a threat and a vulnerability?
A threat is a potential cause of an unwanted incident, while a vulnerability is a weakness that can be exploited by a threat.
Multiple Choice: Which of the following is a sign that a system may be compromised? A) Slow performance B) Increased spam emails C) Both A and B
C) Both A and B
What does the acronym ‘VPN’ stand for?
VPN stands for Virtual Private Network.
What is the primary objective of ethical hacking?
The primary objective of ethical hacking is to identify and fix security vulnerabilities before they can be exploited by malicious hackers.