Threats, Attacks, & Vulnerabilities Flashcards
What does the term ‘threat’ refer to in cybersecurity?
A potential cause of an unwanted incident that may result in harm to a system or organization.
True or False: A vulnerability is a weakness in a system that can be exploited by a threat.
True
Fill in the blank: A _____ attack involves overwhelming a system with traffic to make it unavailable.
Denial of Service (DoS)
What is the primary goal of a phishing attack?
To trick individuals into providing sensitive information such as usernames and passwords.
Which type of malware is designed to replicate itself and spread to other systems?
Virus
What is an example of a physical security threat?
Theft of hardware or equipment.
Multiple Choice: Which of the following is NOT a type of social engineering attack? A) Phishing B) Shoulder Surfing C) Firewall Bypass
C) Firewall Bypass
What does the acronym Ransomware stand for?
A type of malware that encrypts the user’s files and demands payment for the decryption key.
True or False: A zero-day vulnerability is one that is known and has a patch available.
False
What is the purpose of a firewall?
To monitor and control incoming and outgoing network traffic based on predetermined security rules.
Fill in the blank: A _____ attack targets a specific individual or organization.
Spear Phishing
What is the term for an attack that intercepts communication between two parties?
Man-in-the-Middle attack
Multiple Choice: Which of the following is a common method to gain unauthorized access to a system? A) Brute Force Attack B) Data Encryption C) Software Update
A) Brute Force Attack
What is the main function of antivirus software?
To detect, prevent, and remove malicious software from a computer system.
True or False: A DDoS attack is more severe than a DoS attack because it uses multiple systems to launch the attack.
True