Computer Security Threats Quiz

NeatestMagicRealism avatar
NeatestMagicRealism
·
·
Download

Start Quiz

Study Flashcards

26 Questions

Which of the following is a program written to alter the way a computer operates without the permission or knowledge of the user?

Computer virus

What type of program monitors online activities or installs programs without consent for profit or to capture personal information?

Spyware

What do hackers and predators do in the context of computer security threats?

VicƟmize others for their own gain by breaking into computer systems

What is the goal of Phishers in the context of computer security threats?

Steal sensitive financial or personal information through fraudulent email or instant messages

Which type of threat can compromise credit card information, lock you out of your data, and steal your identity?

Phishing attacks

What is a potential attack from a hacker that can allow them to gain unauthorized access to a computer system called?

Threat

What is the main characteristic of TCP (Transmission Control Protocol)?

Connection-oriented and reliable

How does UDP (User Datagram Protocol) differ from TCP?

It is connectionless and unreliable

What is the primary purpose of open ports on the Internet?

To serve as an initial attack vector for attackers

Which type of malware typically gets hidden as a legitimate program?

Trojan horse

What is the characteristic of UDP that makes it suitable for real-time applications?

Connectionless and unreliable

Which protocol ensures that data arrives in the same order it was sent?

TCP (Transmission Control Protocol)

What method does an attacker typically use to hide malicious code within legitimate software?

Social engineering

What are the two kinds of ports contained in every IP address?

TCP and UDP ports

What type of protocol is UDP (User Datagram Protocol)?

Connectionless and unreliable

What makes TCP (Transmission Control Protocol) suitable for applications like web browsing and email?

Connection-oriented and reliable

Match the following port types with their description:

UDP (User Datagram Protocol) port = Connectionless and unreliable protocol used for real-time applications TCP (Transmission Control Protocol) port = Connection-oriented and reliable protocol used for web browsing, file transfers, and email

Match the following characteristics with the corresponding protocol:

Connection-oriented and ensures data integrity = TCP (Transmission Control Protocol) Connectionless and does not guarantee reliable delivery of data = UDP (User Datagram Protocol)

Match the following types of malware with their description:

Trojan horse = Disguised as a legitimate program and delivered through social engineering Phishing attack = Method used by cybercriminals to pull off a data breach

Match the following programming languages with their primary usage:

Python = General-purpose programming JavaScript = Client-side scripting for web applications SQL = Database queries CSS = Styling web pages

Match the computer security threat with its description:

Computer Viruses = A program written to alter the way a computer operates, without the permission or knowledge of the user. Spyware Threats = Any program that monitors online activities or installs programs without consent for profit or to capture personal information. Hackers and Predators = Programmers who victimize others by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism. Phishing = An attempt to steal sensitive financial or personal information through fraudulent email or instant messages.

Match the security threat cause with its example:

Physical Cause = Someone stealing a computer that contains vital data. Non-Physical Cause = A virus attack. Virus Attack = A virus replicates and executes itself, usually doing damage to your computer in the process. Online Predator Attack = Compromising credit card information, locking you out of your data, and stealing your identity.

Match the term with its definition:

Security Threat = A risk that can potentially harm computer systems and organization. Hacker = Someone who gains unauthorized access to computer systems for malicious purposes. Virus = A program written to alter the way a computer operates without the user's permission or knowledge. Phishing = An attempt to steal sensitive financial or personal information through fraudulent communication.

Match the security threat with its potential impact:

Computer Viruses = Alters the way a computer operates and can cause damage to the system. Spyware Threats = Monitors online activities or installs programs without consent for profit or to capture personal information. Hackers and Predators = Can compromise credit card information, lock you out of your data, and steal your identity. Phishing = Attempts to steal sensitive financial or personal information through fraudulent communication.

Match the type of security threat with its primary cause:

Computer Viruses = Programs written to alter the way a computer operates without permission or knowledge of the user. Spyware Threats = Programs that monitor online activities or install programs without consent for profit or to capture personal information. Hackers and Predators = Programmers who victimize others by breaking into computer systems for malicious purposes. Phishing = Attempts to steal sensitive financial or personal information through fraudulent communication.

Match the type of security threat with its characteristic impact:

Computer Viruses = Replicates and executes itself, causing damage to the computer system. Spyware Threats = Monitors online activities or installs programs without consent for profit or to capture personal information. Hackers and Predators = Can compromise credit card information, lock you out of your data, and steal your identity. Phishing = Attempts to steal sensitive financial or personal information through fraudulent communication.

Study Notes

Computer Security Threats

  • A malicious program written to alter a computer's operation without the user's permission or knowledge is called a malware.
  • Spyware is a type of program that monitors online activities or installs programs without consent for profit or to capture personal information.
  • Hackers and predators are individuals who exploit computer security threats to gain unauthorized access to systems or steal sensitive information.

Phishing and Identity Theft

  • The goal of phishers is to trick users into revealing sensitive information, such as passwords or credit card numbers, to steal their identity or commit fraud.
  • Ransomware is a type of threat that can compromise credit card information, lock users out of their data, and steal their identity.

Access Control and Ports

  • A backdoor is a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.
  • TCP (Transmission Control Protocol) is a protocol that ensures data arrives in the same order it was sent, making it suitable for applications like web browsing and email.
  • UDP (User Datagram Protocol) is a protocol that differs from TCP in that it does not guarantee the order of data arrival, making it suitable for real-time applications.
  • Open ports on the Internet allow for communication between devices and are a potential entry point for hackers.
  • Trojans are a type of malware that typically gets hidden as a legitimate program.

Protocols and Ports

  • UDP is a connectionless protocol, making it suitable for real-time applications.
  • TCP is a connection-oriented protocol, ensuring that data arrives in the same order it was sent.
  • IP addresses contain two kinds of ports: TCP ports and UDP ports.

Malware and Programming Languages

  • Malware can be hidden within legitimate software using a technique called code injection.
  • Java is a programming language primarily used for developing web applications and mobile apps.
  • C++ is a programming language primarily used for developing operating systems and games.

Matching Characteristics

  • TCP is a protocol that ensures data arrives in the same order it was sent, making it suitable for applications like web browsing and email.
  • UDP is a protocol that differs from TCP in that it does not guarantee the order of data arrival, making it suitable for real-time applications.
  • Ransomware is a type of malware that can compromise credit card information, lock users out of their data, and steal their identity.
  • Phishing is a computer security threat that involves tricking users into revealing sensitive information.
  • Backdoor is a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.

Test your knowledge on computer security threats and understand the potential risks that can harm computer systems and organizations. Learn about physical and non-physical causes of threats, such as computer viruses and unauthorized access from hackers.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Cybersecurity Threats and Campaigns
9 questions
Quiz Final
14 questions

Quiz Final

NoiselessNoseFlute avatar
NoiselessNoseFlute
Network Security: Types of Threats
5 questions
Use Quizgecko on...
Browser
Browser