Week 3 Q's Flashcards
What is the goal of a Ransomware attack?
A. To gain unauthorized access to a victim’s network
B. To encrypt a victim’s files and demand payment for the decryption key
C. To steal sensitive information from a victim’s network
D. To cause a network to become unavailable to users
B
What is the primary method of a Phishing attack?
A. Encrypting a victim’s files and demanding payment for the decryption key
B. Tricking individuals into divulging sensitive information or downloading malicious software
C. Overloading a target network or website with traffic
D. Injecting malicious code into a website
B
What is the primary goal of a Distributed Denial of Service (DDoS) attack?
A. To steal sensitive information from a victim’s network
B. To cause a network to become unavailable to users
C. To gain unauthorized access to a victim’s network
D. To trick individuals into divulging sensitive information
B
What is an Advanced Persistent Threat (APT)?
A. A type of attack in which multiple compromised computers are used to flood a target network or website with traffic
B. A type of attack in which an attacker gains access to a network and remains there undetected for an extended period of time
C. A type of attack in which an attacker injects malicious code into an SQL statement
D. A type of social engineering attack that tricks individuals into divulging sensitive information
B
What is the primary goal of a SQL Injection attack?
A. To encrypt a victim’s files and demand payment for the decryption key
B. To cause a network to become unavailable to users
C. To inject malicious code into an SQL statement, causing the database to reveal sensitive
information or grant access to unauthorized data
D. To trick individuals into divulging sensitive information
C
What is the primary goal of a Cross-Site Scripting (XSS) attack?
A. To cause a network to become unavailable to users
B. To encrypt a victim’s files and demand payment for the decryption key
C. To inject malicious code into a website, allowing an attacker to steal sensitive information or
control the behavior of the site for the victim’s users
D. To trick individuals into divulging sensitive information
C
What is a Man-in-the-Middle (MITM) attack?
A. A type of attack in which an attacker intercepts and alters the communication between two parties
B. A type of attack in which an attacker gains access to a network and remains there undetected for an extended period of time
C. A type of attack in which multiple compromised computers are used to flood a target network or website with traffic
D. A type of social engineering attack that tricks individuals into divulging sensitive information
A
What is the primary goal of a Zero-Day exploit?
A. To trick individuals into divulging sensitive information
B. To gain unauthorized access to a victim’s network
C. To take advantage of a vulnerability in software or hardware on the same day that the vulnerability is discovered
D. To cause a network to become unavailable to users
C
What type of attack involves an attacker gaining access to a network and remaining there undetected for an extended period of time, with the goal of stealing sensitive data?
A. Cross-Site Scripting (XSS) attack
B. Advanced Persistent Threat (APT)
C. Man-in-the-Middle (MITM) attack
D. Ransomware attack
B
What type of attack involves tricking individuals into divulging sensitive information or downloading malicious software?
A. Ransomware attack
B. Phishing attack
C. SQL injection attack
D. Man-in-the-Middle attack
B
- What is the primary goal of an Advanced Persistent Threat (APT) attack?
A. Flooding a target network with traffic
B. Encrypting a victim’s files
C. Gaining access to a network and stealing sensitive data
D. Injecting malicious code into a website
C
What type of attack involves multiple compromised computers flooding a target network or website with traffic?
A. Phishing attack
B. SQL injection attack
C. Distributed Denial of Service (DDoS) attack
D. Man-in-the-Middle attack
C
What type of attack takes advantage of a vulnerability in software or hardware on the same day that the vulnerability is discovered?
A. Ransomware attack
B. Phishing attack
C. Zero-Day exploit
D. SQL injection attack
C
What type of attack involves injecting malicious code into an SQL statement, causing the database to reveal sensitive information or grant access to unauthorized data?
A. Man-in-the-Middle attack
B. Phishing attack
C. Ransomware attack
D. SQL injection attack
D
What type of attack involves injecting malicious code into a website, allowing an attacker to steal sensitive information or control the behavior of the site for the victim’s users?
A. Distributed Denial of Service (DDoS) attack
B. Advanced Persistent Threat (APT)
C. Cross-Site Scripting (XSS) attack
D. Man-in-the-Middle attack
C