Threats, Attacks, & Vulnerabilities Flashcards

1
Q

What does the term ‘threat’ refer to in cybersecurity?

A

A potential cause of an unwanted incident that may result in harm to a system or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A vulnerability is a weakness in a system that can be exploited by a threat.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: A _____ attack involves overwhelming a system with traffic to make it unavailable.

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary goal of a phishing attack?

A

To trick individuals into providing sensitive information such as usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of malware is designed to replicate itself and spread to other systems?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of a physical security threat?

A

Theft of hardware or equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multiple Choice: Which of the following is NOT a type of social engineering attack? A) Phishing B) Shoulder Surfing C) Firewall Bypass

A

C) Firewall Bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the acronym Ransomware stand for?

A

A type of malware that encrypts the user’s files and demands payment for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: A zero-day vulnerability is one that is known and has a patch available.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a firewall?

A

To monitor and control incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: A _____ attack targets a specific individual or organization.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the term for an attack that intercepts communication between two parties?

A

Man-in-the-Middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multiple Choice: Which of the following is a common method to gain unauthorized access to a system? A) Brute Force Attack B) Data Encryption C) Software Update

A

A) Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main function of antivirus software?

A

To detect, prevent, and remove malicious software from a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: A DDoS attack is more severe than a DoS attack because it uses multiple systems to launch the attack.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the term for a weak password that is easy to guess or crack?

A

Weak password

17
Q

Fill in the blank: _____ is a technique used by attackers to gain access by exploiting weaknesses in software.

A

Exploitation

18
Q

What does the acronym SQL in SQL Injection stand for?

A

Structured Query Language

19
Q

What is the purpose of a penetration test?

A

To simulate an attack on a system to identify vulnerabilities.

20
Q

Multiple Choice: Which of the following is a method of securing data at rest? A) Data Encryption B) Network Monitoring C) User Training

A

A) Data Encryption

21
Q

What is the main difference between a worm and a virus?

A

A worm can self-replicate and spread independently, while a virus requires a host file.

22
Q

True or False: Insider threats come from individuals within an organization who have access to its resources.

23
Q

Fill in the blank: A _____ is a malicious software that disguises itself as legitimate software.

A

Trojan horse

24
Q

What is the purpose of an Intrusion Detection System (IDS)?

A

To monitor network traffic for suspicious activity and alert administrators.

25
What does the term 'patch management' refer to?
The process of managing updates for software applications and technologies.
26
Multiple Choice: Which of the following is NOT a type of malware? A) Adware B) Spyware C) Firewall
C) Firewall