Chapter 1 Flashcards

Cybersecurity Threats and Attacks

1
Q

What is Denial of Service (DoS)?

A

A type of cyber attack that overwhelms a system, making it unavailable to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a BotNet?

A

A group of compromised computers (bots) connected to the internet and controlled remotely by a malicious actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are On-Path Attacks (Man-in-the-Middle - MitM)?

A

An attacker intercepts and potentially modifies communications between two parties, such as a web browser and a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Social Engineering Attacks?

A

Psychological manipulation techniques used to trick individuals into revealing confidential information or taking unsafe actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Phishing?

A

Deceptive emails or messages designed to steal sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Watering Hole Attacks?

A

Attackers compromise websites frequently visited by their target group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Business Email Compromise (BEC) Attacks?

A

Attackers impersonate executives to trick employees into financial transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Physical Social Engineering?

A

Techniques involving physical interaction to manipulate individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Trojan Horse?

A

Malware disguised as legitimate software to gain user privileges and execute harmful actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Worms?

A

Self-replicating malware that exploits system vulnerabilities to spread across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Rootkit?

A

A type of malware that modifies system files and monitoring tools to remain undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Virus?

A

Malicious code that attaches itself to executable files and spreads by infecting other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Scareware?

A

Displays fake warnings about security risks to trick users into downloading malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Adware?

A

Delivers unwanted advertisements, often through web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Backdoor?

A

A hidden way to bypass normal authentication and gain access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Spyware?

A

Monitors user activity, records keystrokes, and collects personal data.

17
Q

What is Man-in-the-Mobile (MitMo)?

A

Targets mobile devices like phones and tablets to steal sensitive data.

18
Q

What is Traffic Interception?

A

The process of capturing and potentially modifying network packets as they pass through a network.

19
Q

What are Dictionary Attacks?

A

Using a list of common words to guess passwords.

20
Q

What are Brute Force Attacks?

A

Trying all possible combinations of letters, numbers, and symbols.

21
Q

What is an Exploit?

A

A program written to take advantage of a known vulnerability.

22
Q

What are Race Conditions?

A

Flaws that occur when multiple processes access shared data simultaneously.

23
Q

What are Weak Security Practices?

A

Includes outdated software, weak passwords, and inadequate access controls.

24
Q

What is Access Control?

A

The process of managing who can access what resources and what they can do with them.

25
What is Cryptojacking?
Malware that secretly uses a victim's computer or device to mine cryptocurrency without their knowledge.