Threats, Attacks, & Vulnerabilities Flashcards

1
Q

What does the term ‘threat’ refer to in cybersecurity?

A

A potential cause of an unwanted incident that may result in harm to a system or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A vulnerability is a weakness in a system that can be exploited by a threat.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: A _____ attack involves overwhelming a system with traffic to make it unavailable.

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary goal of a phishing attack?

A

To trick individuals into providing sensitive information such as usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of malware is designed to replicate itself and spread to other systems?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an example of a physical security threat?

A

Theft of hardware or equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multiple Choice: Which of the following is NOT a type of social engineering attack? A) Phishing B) Shoulder Surfing C) Firewall Bypass

A

C) Firewall Bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the acronym Ransomware stand for?

A

A type of malware that encrypts the user’s files and demands payment for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: A zero-day vulnerability is one that is known and has a patch available.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a firewall?

A

To monitor and control incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: A _____ attack targets a specific individual or organization.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the term for an attack that intercepts communication between two parties?

A

Man-in-the-Middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multiple Choice: Which of the following is a common method to gain unauthorized access to a system? A) Brute Force Attack B) Data Encryption C) Software Update

A

A) Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main function of antivirus software?

A

To detect, prevent, and remove malicious software from a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: A DDoS attack is more severe than a DoS attack because it uses multiple systems to launch the attack.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the term for a weak password that is easy to guess or crack?

A

Weak password

17
Q

Fill in the blank: _____ is a technique used by attackers to gain access by exploiting weaknesses in software.

A

Exploitation

18
Q

What does the acronym SQL in SQL Injection stand for?

A

Structured Query Language

19
Q

What is the purpose of a penetration test?

A

To simulate an attack on a system to identify vulnerabilities.

20
Q

Multiple Choice: Which of the following is a method of securing data at rest? A) Data Encryption B) Network Monitoring C) User Training

A

A) Data Encryption

21
Q

What is the main difference between a worm and a virus?

A

A worm can self-replicate and spread independently, while a virus requires a host file.

22
Q

True or False: Insider threats come from individuals within an organization who have access to its resources.

A

True

23
Q

Fill in the blank: A _____ is a malicious software that disguises itself as legitimate software.

A

Trojan horse

24
Q

What is the purpose of an Intrusion Detection System (IDS)?

A

To monitor network traffic for suspicious activity and alert administrators.

25
Q

What does the term ‘patch management’ refer to?

A

The process of managing updates for software applications and technologies.

26
Q

Multiple Choice: Which of the following is NOT a type of malware? A) Adware B) Spyware C) Firewall

A

C) Firewall