Topic 2 - Reset Flashcards

1
Q

Malware

A

Refers to malicious software designed to disrupt, damage or gain unauthorized access to systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware Prevention Methods

A
  1. Regular Software Updates
  2. Antivirus Software
  3. Network Segmentation
  4. Educate Users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware Prevention Tools and Strategies

A
  1. Patch Management Systems
  2. Endpoint Detection and Response (EDR)
  3. Regular Backups
  4. Network Segmentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Involves tricking individuals into providing sensitive information by pretending to be a trusted entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing Prevention Methods

A
  1. Email Filtering
  2. Employee Training
  3. Verify Links and Senders
  4. Multi-Factor Authentication (MFA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing Prevention Tools and Strategies

A
  1. Email Security Gateways
  2. Phishing Simulations
  3. Zero Trust Access
  4. Threat Intelligence Feeds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering

A

This threat exploits human psychology to manipulate individuals into divulging confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering Prevention Methods

A
  1. Strict Access Control
  2. Verify Requests
  3. Awareness Programs
  4. Incident Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering Prevention Tools and Strategies

A
  1. Access management
  2. Strong Internal Authentication
  3. Verification Protocols
  4. Social Engineering Defense Training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software Vulnerabilities

A

Flaws or weaknesses in code that attackers can exploit to compromise systems, steal data, or gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software Vulnerabilities

Common Vulnerabilities

A
  1. Buffer Overflow
  2. Injection Flaws (SQL/Command injection)
  3. Cross-Site Scripting (XSS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hardware Vulnerabilities

A
  1. Physical Access Exploits
  2. Side-Channel Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Vulnerabilities

A

Weaknesses in network protocols, configurations, or infrastructure that can lead to unauthorized access or data interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Vulnerabilities

Common Vulnerabilities

A
  1. Weak or Default Credentials
  2. Man-in-the-Middle (MITM) Attacks
  3. Unsecured Network Devices
  4. Denial of Service (DoS) and Distributed Denial of Service (DDos Attacks:
  5. Outdated or Insecure Protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Denial of Service (DoS)

A

Overloading systems of networks to make them unavailable to legitimate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Man in the Middle (MITM) Attacks

A

Intercepting communication between two parties to eavesdrop or alter data

17
Q

Password Attacks

A

Cracking or steals passwords through brute force, dictionary, attacks, or keylogging

18
Q

Zero-Day Exploits

A

Exploiting software vulnerabilities before the vendor releases a patch

19
Q

Refers to malicious software designed to disrupt, damage or gain unauthorized access to systems

20
Q

Involves tricking individuals into providing sensitive information by pretending to be a trusted entity

21
Q

This threat exploits human psychology to manipulate individuals into divulging confidential information

A

Social Engineering

22
Q

Flaws or weaknesses in code that attackers can exploit to compromise systems, steal data, or gain unauthorized access

A

Software Vulnerabilities

23
Q

Weaknesses in network protocols, configurations, or infrastructure that can lead to unauthorized access or data interception

A

Network Vulnerabilities

24
Q

Overloading systems of networks to make them unavailable to legitimate users

A

Denial of Service (DoS)

25
Q

Intercepting communication between two parties to eavesdrop or alter data

A

Man in the Middle (MITM) Attacks

26
Q

Cracking or steals passwords through brute force, dictionary, attacks, or keylogging

A

Password Attacks

27
Q

Exploiting software vulnerabilities before the vendor releases a patch

A

Zero-Day Exploits