Threats, Attacks, & Vulnerabilities Flashcards
What does the term ‘threat’ refer to in cybersecurity?
A potential cause of an unwanted incident that may result in harm to a system or organization.
True or False: A vulnerability is a weakness in a system that can be exploited by a threat.
True
Fill in the blank: A _____ attack involves overwhelming a system with traffic to make it unavailable.
Denial of Service (DoS)
What is the primary goal of a phishing attack?
To trick individuals into providing sensitive information such as usernames and passwords.
Which type of malware is designed to replicate itself and spread to other systems?
Virus
What is an example of a physical security threat?
Theft of hardware or equipment.
Multiple Choice: Which of the following is NOT a type of social engineering attack? A) Phishing B) Shoulder Surfing C) Firewall Bypass
C) Firewall Bypass
What does the acronym Ransomware stand for?
A type of malware that encrypts the user’s files and demands payment for the decryption key.
True or False: A zero-day vulnerability is one that is known and has a patch available.
False
What is the purpose of a firewall?
To monitor and control incoming and outgoing network traffic based on predetermined security rules.
Fill in the blank: A _____ attack targets a specific individual or organization.
Spear Phishing
What is the term for an attack that intercepts communication between two parties?
Man-in-the-Middle attack
Multiple Choice: Which of the following is a common method to gain unauthorized access to a system? A) Brute Force Attack B) Data Encryption C) Software Update
A) Brute Force Attack
What is the main function of antivirus software?
To detect, prevent, and remove malicious software from a computer system.
True or False: A DDoS attack is more severe than a DoS attack because it uses multiple systems to launch the attack.
True
What is the term for a weak password that is easy to guess or crack?
Weak password
Fill in the blank: _____ is a technique used by attackers to gain access by exploiting weaknesses in software.
Exploitation
What does the acronym SQL in SQL Injection stand for?
Structured Query Language
What is the purpose of a penetration test?
To simulate an attack on a system to identify vulnerabilities.
Multiple Choice: Which of the following is a method of securing data at rest? A) Data Encryption B) Network Monitoring C) User Training
A) Data Encryption
What is the main difference between a worm and a virus?
A worm can self-replicate and spread independently, while a virus requires a host file.
True or False: Insider threats come from individuals within an organization who have access to its resources.
True
Fill in the blank: A _____ is a malicious software that disguises itself as legitimate software.
Trojan horse
What is the purpose of an Intrusion Detection System (IDS)?
To monitor network traffic for suspicious activity and alert administrators.
What does the term ‘patch management’ refer to?
The process of managing updates for software applications and technologies.
Multiple Choice: Which of the following is NOT a type of malware? A) Adware B) Spyware C) Firewall
C) Firewall