cyber security incidents Flashcards

(26 cards)

1
Q

What is a phishing attack?

A

A phishing attack is a cyber attack that attempts to trick individuals into providing sensitive information by masquerading as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Denial of Service (DoS) attacks aim to make a network resource unavailable to its intended users.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: Malware is a type of software designed to __________.

A

disrupt, damage, or gain unauthorized access to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the acronym Ransomware stand for?

A

Ransomware is a type of malware that encrypts a user’s files and demands payment for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of cyber attack involves intercepting communications between two parties?

A

Man-in-the-Middle (MitM) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary goal of a Distributed Denial of Service (DDoS) attack?

A

To overwhelm a target system with traffic, making it unavailable to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: SQL Injection attacks exploit vulnerabilities in web applications that interact with databases.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is social engineering in the context of cyber attacks?

A

Social engineering is the manipulation of individuals into divulging confidential or personal information for fraudulent purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify the type of cyber attack: An attacker uses malicious code to redirect users to a fraudulent website.

A

Pharming attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an APT (Advanced Persistent Threat)?

A

An APT is a prolonged and targeted cyber attack where an intruder gains access to a network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: Cross-Site Scripting (XSS) allows attackers to inject __________ into web pages viewed by users.

A

malicious scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a keylogger?

A

A keylogger is a type of malware designed to record keystrokes made by a user to capture sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Credential stuffing attacks use stolen username and password pairs to gain unauthorized access to multiple accounts.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a zero-day exploit?

A

A zero-day exploit is an attack that occurs on the same day a vulnerability is discovered, before a patch is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which cyber attack involves sending unsolicited bulk messages, often for advertising purposes?

A

Spam attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a drive-by download?

A

A drive-by download is a malicious download that occurs without the user’s consent or knowledge when visiting a compromised website.

17
Q

Fill in the blank: In a __________ attack, the attacker captures the target’s network traffic to steal sensitive data.

18
Q

What type of attack involves exploiting weaknesses in a wireless network’s security?

A

Wi-Fi hacking

19
Q

True or False: A rogue software update can be a method of delivering malware to users.

20
Q

What is the term for the unauthorized access to a computer system to steal or manipulate data?

21
Q

What is the primary function of a firewall in cybersecurity?

A

A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules.

22
Q

Fill in the blank: __________ attacks involve inserting malicious code into a website or application to manipulate its behavior.

23
Q

In terms of cyber attacks, what does the term ‘payload’ refer to?

A

The payload refers to the part of the malware that performs the malicious action, such as deleting files or stealing data.

24
Q

What is the main objective of an insider threat?

A

To exploit access to sensitive information or systems from within the organization.

25
True or False: A clickjacking attack tricks users into clicking on something different from what they perceive.
True
26
What is the difference between a virus and a worm in cybersecurity?
A virus attaches itself to a host file and requires user action to spread, while a worm is a standalone malware that replicates itself to spread without user intervention.