cybersecurity who?? Flashcards

1
Q

What are the common forms of cyberattacks?

A

Common forms include phishing , social engineering attacks, malware , and denial-of-service attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Trojan horse?

A

A Trojan horse disguises itself as legitimate software to trick users into installing it. Once installed, it can perform malicious activities like stealing data or creating backdoors for attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is spyware?

A

Spyware is software that secretly monitors and collects information about a user’s activities on their device, often without their knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does ransomware work?

A

Ransomware encrypts a victim’s files or locks their system, then demands a ransom to restore access. Paying the ransom doesn’t guarantee file recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you detect malware on your system?

A

Use antivirus or anti-malware software to scan your system regularly, monitor for unusual system behaviour, and keep an eye on your network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what’s a keyloggers function

A

To Record a user’s keystrokes to capture sensitive information like passwords and credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what’s a trojan (malware)

A

Disguised as legitimate software, they trick users into installing them, then perform malicious actions like stealing data or creating backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a DDos attack

A

Overwhelm a system’s resources by flooding it with traffic, causing it to slow down or crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly