cyber attacks and threats Flashcards

(23 cards)

1
Q

What is a cyber attack?

A

A cyber attack is a malicious attempt to damage, disrupt, or gain unauthorized access to computer systems, networks, or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Cyber threats only come from external sources.

A

False: Cyber threats can come from both external and internal sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: A ______________ is a type of cyber attack where attackers try to overwhelm a system with traffic.

A

DDoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing?

A

Phishing is a type of cyber attack that uses deceptive emails or websites to trick individuals into providing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multiple Choice: Which of the following is a common type of malware? A) Firewall B) Trojan C) VPN

A

B) Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of ransomware?

A

Ransomware encrypts a victim’s files and demands payment for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: All cyber attacks are financially motivated.

A

False: While many cyber attacks are financially motivated, others may be politically or ideologically driven.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the term ‘zero-day vulnerability’ refer to?

A

A zero-day vulnerability is a security flaw that is unknown to the software vendor and has no patch available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multiple Choice: Which of the following is a method used to protect against cyber attacks? A) Antivirus software B) Ignoring updates C) Using weak passwords

A

A) Antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering in the context of cyber threats?

A

Social engineering is the psychological manipulation of people into divulging confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: A __________ is a program that replicates itself to spread to other computers, often causing harm.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main goal of a denial-of-service (DoS) attack?

A

The main goal of a DoS attack is to make a network service unavailable to its intended users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Cybersecurity is only the responsibility of IT departments.

A

False: Cybersecurity is everyone’s responsibility within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a botnet?

A

A botnet is a network of infected computers that are controlled remotely by an attacker to perform coordinated tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiple Choice: What is the best practice for creating a strong password? A) Use your name B) Use a mix of letters, numbers, and symbols C) Use the same password for all accounts

A

B) Use a mix of letters, numbers, and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of a firewall in cybersecurity?

A

A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules.

17
Q

Fill in the blank: Cyber __________ refers to the potential for loss or harm related to technical infrastructure or the use of technology.

18
Q

What is a vulnerability assessment?

A

A vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.

19
Q

True or False: Cyber threats cannot be mitigated.

A

False: Cyber threats can be mitigated through various security measures and best practices.

20
Q

What is the difference between a threat and a vulnerability?

A

A threat is a potential cause of an unwanted incident, while a vulnerability is a weakness that can be exploited by a threat.

21
Q

Multiple Choice: Which of the following is a sign that a system may be compromised? A) Slow performance B) Increased spam emails C) Both A and B

A

C) Both A and B

22
Q

What does the acronym ‘VPN’ stand for?

A

VPN stands for Virtual Private Network.

23
Q

What is the primary objective of ethical hacking?

A

The primary objective of ethical hacking is to identify and fix security vulnerabilities before they can be exploited by malicious hackers.