Week 3 Q's Flashcards

1
Q

What is the goal of a Ransomware attack?

A. To gain unauthorized access to a victim’s network
B. To encrypt a victim’s files and demand payment for the decryption key
C. To steal sensitive information from a victim’s network
D. To cause a network to become unavailable to users

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary method of a Phishing attack?

A. Encrypting a victim’s files and demanding payment for the decryption key
B. Tricking individuals into divulging sensitive information or downloading malicious software
C. Overloading a target network or website with traffic
D. Injecting malicious code into a website

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of a Distributed Denial of Service (DDoS) attack?

A. To steal sensitive information from a victim’s network
B. To cause a network to become unavailable to users
C. To gain unauthorized access to a victim’s network
D. To trick individuals into divulging sensitive information

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Advanced Persistent Threat (APT)?

A. A type of attack in which multiple compromised computers are used to flood a target network or website with traffic
B. A type of attack in which an attacker gains access to a network and remains there undetected for an extended period of time
C. A type of attack in which an attacker injects malicious code into an SQL statement
D. A type of social engineering attack that tricks individuals into divulging sensitive information

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary goal of a SQL Injection attack?

A. To encrypt a victim’s files and demand payment for the decryption key
B. To cause a network to become unavailable to users
C. To inject malicious code into an SQL statement, causing the database to reveal sensitive
information or grant access to unauthorized data
D. To trick individuals into divulging sensitive information

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary goal of a Cross-Site Scripting (XSS) attack?

A. To cause a network to become unavailable to users
B. To encrypt a victim’s files and demand payment for the decryption key
C. To inject malicious code into a website, allowing an attacker to steal sensitive information or
control the behavior of the site for the victim’s users
D. To trick individuals into divulging sensitive information

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Man-in-the-Middle (MITM) attack?

A. A type of attack in which an attacker intercepts and alters the communication between two parties
B. A type of attack in which an attacker gains access to a network and remains there undetected for an extended period of time
C. A type of attack in which multiple compromised computers are used to flood a target network or website with traffic
D. A type of social engineering attack that tricks individuals into divulging sensitive information

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary goal of a Zero-Day exploit?

A. To trick individuals into divulging sensitive information
B. To gain unauthorized access to a victim’s network
C. To take advantage of a vulnerability in software or hardware on the same day that the vulnerability is discovered
D. To cause a network to become unavailable to users

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of attack involves an attacker gaining access to a network and remaining there undetected for an extended period of time, with the goal of stealing sensitive data?

A. Cross-Site Scripting (XSS) attack
B. Advanced Persistent Threat (APT)
C. Man-in-the-Middle (MITM) attack
D. Ransomware attack

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of attack involves tricking individuals into divulging sensitive information or downloading malicious software?

A. Ransomware attack
B. Phishing attack
C. SQL injection attack
D. Man-in-the-Middle attack

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is the primary goal of an Advanced Persistent Threat (APT) attack?

A. Flooding a target network with traffic
B. Encrypting a victim’s files
C. Gaining access to a network and stealing sensitive data
D. Injecting malicious code into a website

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of attack involves multiple compromised computers flooding a target network or website with traffic?

A. Phishing attack
B. SQL injection attack
C. Distributed Denial of Service (DDoS) attack
D. Man-in-the-Middle attack

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack takes advantage of a vulnerability in software or hardware on the same day that the vulnerability is discovered?

A. Ransomware attack
B. Phishing attack
C. Zero-Day exploit
D. SQL injection attack

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of attack involves injecting malicious code into an SQL statement, causing the database to reveal sensitive information or grant access to unauthorized data?

A. Man-in-the-Middle attack
B. Phishing attack
C. Ransomware attack
D. SQL injection attack

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of attack involves injecting malicious code into a website, allowing an attacker to steal sensitive information or control the behavior of the site for the victim’s users?

A. Distributed Denial of Service (DDoS) attack
B. Advanced Persistent Threat (APT)
C. Cross-Site Scripting (XSS) attack
D. Man-in-the-Middle attack

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of attack intercepts and alters the communication between two parties, allowing the attacker to steal sensitive information or control the flow of communication?

A. Ransomware attack
B. Cross-Site Scripting (XSS) attack
C. Man-in-the-Middle (MITM) attack
D. Phishing attack

A

C

17
Q

What type of malware encrypts a victim’s files and demands for the decryption key?

A. Ransomware
B. Phishing attack
C. Distributed Denial of Service (DDoS) attack
D. Man-in-the-Middle (MITM) attack

A

A

18
Q

What type of attack is a type of social engineering attack that tricks individuals into divulging sensitive information or downloading malicious software?

A. Ransomware attack
B. Phishing attack
C. Cross-Site Scripting (XSS) attack
D. Man-in-the-Middle (MITM) attack

A

B

19
Q

Which type of cyber attack involves an attacker tricking a user into revealing sensitive information, such as passwords or credit card numbers?

A. DDoS attack
B. Phishing attack
C. Ransomware attack
D. SQL injection attack

A

B