Cisco Confidential: Security Vulnerabilities

JawDroppingLearning1872 avatar
JawDroppingLearning1872
·
·
Download

Start Quiz

Study Flashcards

22 Questions

What type of security vulnerability occurs when data is written beyond the limits of a buffer?

Buffer Overflow

What is the primary purpose of ransomware?

To hold a computer system or data captive until a payment is made

What type of security vulnerability occurs due to improperly ordered or timed events?

Race Conditions

What type of malware is used to automatically perform actions?

Bot

What is the primary purpose of access control?

To protect sensitive data through authentication and authorization

What type of malware is used to track and spy on the user?

Spyware

What type of malware modifies the operating system to create a backdoor?

Rootkit

What is the primary method by which worms spread?

By exploiting vulnerabilities in networks

What is a common symptom of malware infection?

Unexplained problems with network connections

What type of cyber attack involves manipulating an individual into performing actions or divulging confidential information?

Social Engineering

What type of malware disguises itself as a legitimate program, but carries out malicious operations?

Trojan horse

What is a potential indication of malware infection?

Presence of unknown files, programs, or desktop icons

What type of cyber attack involves following an authorized person into a secure location?

Tailgating

What type of malware attaches itself to other executable files?

Virus

What is a primary characteristic of a Denial of Service (DoS) attack?

Overwhelming quantity of traffic

Which of the following describes a Distributed Denial of Service (DDoS) attack?

Launching attacks from multiple, coordinated sources

What is the role of a botnet in a DDoS attack?

To send overwhelming traffic from a network of infected hosts

What does SEO Poisoning aim to achieve?

Increase traffic to malicious websites

Which component is commonly used in a blended attack?

Malicious links distributed through spam emails

Which of the following best describes blended attacks?

Combining multiple techniques, such as worms and spam, to compromise a target

Which of these is an example of a blended attack?

Phishing emails combined with DDoS

What is a common method used by zombies in a DDoS attack?

Continuing to infect more hosts

This quiz covers different types of security vulnerabilities, including buffer overflow, non-validated input, race conditions, and weaknesses in security practices. It also discusses access control problems and their impact on security.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser