reviewer Flashcards

(15 cards)

1
Q

What are cybersecurity threats?

A

Cybersecurity threats are potential malicious attacks that aim to damage, steal, or disrupt information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a vulnerability in cybersecurity?

A

A vulnerability is a weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three common types of cybersecurity threats.

A
  • Malware
  • Phishing
  • Denial of Service (DoS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: A cybersecurity vulnerability can exist in hardware, software, or organizational processes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blank: A _______ is a software designed to disrupt, damage, or gain unauthorized access to computer systems.

A

[malware]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

Phishing is a method of trying to gather personal information using deceptive emails and websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of a Denial of Service (DoS) attack?

A

To make a machine or network resource unavailable to its intended users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the term ‘exploit’ refer to in cybersecurity?

A

An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identify two consequences of a cybersecurity breach.

A
  • Data loss
  • Financial loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: Cybersecurity threats can lead to _______ of sensitive information.

A

[leakage]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are social engineering attacks?

A

Social engineering attacks manipulate individuals into divulging confidential or personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: All cybersecurity vulnerabilities can be patched.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of a firewall in cybersecurity?

A

A firewall acts as a barrier between a trusted network and untrusted networks to control incoming and outgoing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name two common methods used to mitigate cybersecurity threats.

A
  • Regular software updates
  • User education and training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: Cybersecurity involves protecting _______ from theft or damage.

A

[information]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly