Cisco Confidential: Security Vulnerabilities
22 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of security vulnerability occurs when data is written beyond the limits of a buffer?

  • Non-validated Input
  • Access-control Problem
  • Buffer Overflow (correct)
  • Weakness in Security Practices

What is the primary purpose of ransomware?

  • To deliver advertisements
  • To persuade the user to take a specific action based on fear
  • To hold a computer system or data captive until a payment is made (correct)
  • To track and spy on the user

What type of security vulnerability occurs due to improperly ordered or timed events?

  • Race Conditions (correct)
  • Non-validated Input
  • Buffer Overflow
  • Weaknesses in Security Practices

What type of malware is used to automatically perform actions?

<p>Bot (C)</p> Signup and view all the answers

What is the primary purpose of access control?

<p>To protect sensitive data through authentication and authorization (A)</p> Signup and view all the answers

What type of malware is used to track and spy on the user?

<p>Spyware (B)</p> Signup and view all the answers

What type of malware modifies the operating system to create a backdoor?

<p>Rootkit (B)</p> Signup and view all the answers

What is the primary method by which worms spread?

<p>By exploiting vulnerabilities in networks (A)</p> Signup and view all the answers

What is a common symptom of malware infection?

<p>Unexplained problems with network connections (B)</p> Signup and view all the answers

What type of cyber attack involves manipulating an individual into performing actions or divulging confidential information?

<p>Social Engineering (C)</p> Signup and view all the answers

What type of malware disguises itself as a legitimate program, but carries out malicious operations?

<p>Trojan horse (C)</p> Signup and view all the answers

What is a potential indication of malware infection?

<p>Presence of unknown files, programs, or desktop icons (C)</p> Signup and view all the answers

What type of cyber attack involves following an authorized person into a secure location?

<p>Tailgating (A)</p> Signup and view all the answers

What type of malware attaches itself to other executable files?

<p>Virus (C)</p> Signup and view all the answers

What is a primary characteristic of a Denial of Service (DoS) attack?

<p>Overwhelming quantity of traffic (D)</p> Signup and view all the answers

Which of the following describes a Distributed Denial of Service (DDoS) attack?

<p>Launching attacks from multiple, coordinated sources (B)</p> Signup and view all the answers

What is the role of a botnet in a DDoS attack?

<p>To send overwhelming traffic from a network of infected hosts (D)</p> Signup and view all the answers

What does SEO Poisoning aim to achieve?

<p>Increase traffic to malicious websites (C)</p> Signup and view all the answers

Which component is commonly used in a blended attack?

<p>Malicious links distributed through spam emails (A)</p> Signup and view all the answers

Which of the following best describes blended attacks?

<p>Combining multiple techniques, such as worms and spam, to compromise a target (C)</p> Signup and view all the answers

Which of these is an example of a blended attack?

<p>Phishing emails combined with DDoS (A)</p> Signup and view all the answers

What is a common method used by zombies in a DDoS attack?

<p>Continuing to infect more hosts (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser