22 Questions
What type of security vulnerability occurs when data is written beyond the limits of a buffer?
Buffer Overflow
What is the primary purpose of ransomware?
To hold a computer system or data captive until a payment is made
What type of security vulnerability occurs due to improperly ordered or timed events?
Race Conditions
What type of malware is used to automatically perform actions?
Bot
What is the primary purpose of access control?
To protect sensitive data through authentication and authorization
What type of malware is used to track and spy on the user?
Spyware
What type of malware modifies the operating system to create a backdoor?
Rootkit
What is the primary method by which worms spread?
By exploiting vulnerabilities in networks
What is a common symptom of malware infection?
Unexplained problems with network connections
What type of cyber attack involves manipulating an individual into performing actions or divulging confidential information?
Social Engineering
What type of malware disguises itself as a legitimate program, but carries out malicious operations?
Trojan horse
What is a potential indication of malware infection?
Presence of unknown files, programs, or desktop icons
What type of cyber attack involves following an authorized person into a secure location?
Tailgating
What type of malware attaches itself to other executable files?
Virus
What is a primary characteristic of a Denial of Service (DoS) attack?
Overwhelming quantity of traffic
Which of the following describes a Distributed Denial of Service (DDoS) attack?
Launching attacks from multiple, coordinated sources
What is the role of a botnet in a DDoS attack?
To send overwhelming traffic from a network of infected hosts
What does SEO Poisoning aim to achieve?
Increase traffic to malicious websites
Which component is commonly used in a blended attack?
Malicious links distributed through spam emails
Which of the following best describes blended attacks?
Combining multiple techniques, such as worms and spam, to compromise a target
Which of these is an example of a blended attack?
Phishing emails combined with DDoS
What is a common method used by zombies in a DDoS attack?
Continuing to infect more hosts
This quiz covers different types of security vulnerabilities, including buffer overflow, non-validated input, race conditions, and weaknesses in security practices. It also discusses access control problems and their impact on security.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free