Cyber Security Term 2 Quiz
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is cyber security?

  • A virtual space that doesn't exist
  • The practice of defending computers, servers, and data from malicious attacks (correct)
  • A type of cyber attack
  • A type of cyber threat
  • What is a cyber attack?

  • A type of cyber threat
  • An attempt by hackers to damage or destroy a computer network or system (correct)
  • The practice of defending computers, servers, and data from malicious attacks
  • A virtual space that doesn't exist
  • What is cyber space?

  • A type of cyber threat
  • A virtual space that doesn't exist (correct)
  • The practice of defending computers, servers, and data from malicious attacks
  • A type of cyber attack
  • What is a cyber threat?

    <p>A probability that a specific type of attack may occur</p> Signup and view all the answers

    Which of the following is an example of a cyber threat?

    <p>A hacker attempting to access a computer system</p> Signup and view all the answers

    What is the main goal of cyber attacks?

    <p>To damage or destroy a computer network or system</p> Signup and view all the answers

    What does cyber security protect against?

    <p>All of the above</p> Signup and view all the answers

    What is the relationship between cyber threats and cyber attacks?

    <p>Cyber threats are possibilities of cyber attacks</p> Signup and view all the answers

    What is the main intent behind cyber threats related to financial gain?

    <p>To steal confidential information</p> Signup and view all the answers

    What is the primary goal of ransomware attacks?

    <p>To demand a ransom in exchange for access to data</p> Signup and view all the answers

    What is spear phishing?

    <p>A type of phishing attack that targets a specific individual</p> Signup and view all the answers

    What is the main difference between phishing and spear phishing?

    <p>Phishing targets a large group, while spear phishing targets a specific individual</p> Signup and view all the answers

    What is a man-in-the-middle attack?

    <p>A type of attack where the attacker intercepts electronic messages</p> Signup and view all the answers

    How many broad categories of intent are there behind cyber threats?

    <p>Three</p> Signup and view all the answers

    What is the goal of corporate espionage?

    <p>To steal confidential information for competitive advantage</p> Signup and view all the answers

    What is the common feature of virtually every cyber threat?

    <p>They all fall into one of three modes of intent</p> Signup and view all the answers

    What is adware?

    <p>A type of malware that hides on a device and serves advertisements</p> Signup and view all the answers

    What is the primary goal of a Denial of Service attack?

    <p>To overload a target system with traffic</p> Signup and view all the answers

    What is spyware designed to do?

    <p>Gather data about a user and forward it to a third-party</p> Signup and view all the answers

    What is a characteristic of a worm?

    <p>It actively propagates itself to other systems</p> Signup and view all the answers

    What is a common type of cyberattack?

    <p>Malware attack</p> Signup and view all the answers

    What is a Trojan?

    <p>A type of malware that enters a system looking like a standard piece of software</p> Signup and view all the answers

    What is a vulnerability of IoT devices?

    <p>They are vulnerable to cyber threats</p> Signup and view all the answers

    What is a characteristic of a virus?

    <p>It is a self-propagating malware</p> Signup and view all the answers

    What should you do with email attachments from unknown senders?

    <p>Delete them immediately</p> Signup and view all the answers

    What is the primary motivation behind a data breach?

    <p>To embarrass an institution</p> Signup and view all the answers

    What makes a strong password?

    <p>Making it difficult to guess</p> Signup and view all the answers

    What is the result of a DDoS attack on a website?

    <p>The website crashes from an overload of demand</p> Signup and view all the answers

    Why is it important to update your operating system and software?

    <p>To remove viruses and malware</p> Signup and view all the answers

    How can malware be embedded in mobile devices?

    <p>Through app downloads, mobile websites, or phishing emails and text messages</p> Signup and view all the answers

    What is the main reason why online safety is important?

    <p>Because criminals can access your personal information</p> Signup and view all the answers

    What is the result of not using anti-virus software?

    <p>Threats will not be detected and removed</p> Signup and view all the answers

    What is the analogy used to describe passwords?

    <p>Passwords are like underwear</p> Signup and view all the answers

    What can be accessed by a malicious actor through a compromised mobile device?

    <p>Personal information, location data, financial accounts, and more</p> Signup and view all the answers

    What increases the potential for criminals to access your personal information?

    <p>Having multiple devices and accounts</p> Signup and view all the answers

    What is a common outcome of a successful DDoS attack?

    <p>The website crashes from an overload of demand</p> Signup and view all the answers

    What is the benefit of using strong passwords?

    <p>Your personal information is better protected</p> Signup and view all the answers

    What should you do to protect yourself from cyber attacks?

    <p>Use strong passwords and update your operating system</p> Signup and view all the answers

    What is a common motive for data breaches?

    <p>To commit identity theft</p> Signup and view all the answers

    What can be stolen in a data breach?

    <p>Any kind of data, including personal and financial information</p> Signup and view all the answers

    Study Notes

    Cyber Security

    • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Cyber threats refer to attacks mounted against digital devices through cyberspace, which is a virtual space that doesn't exist but is a metaphor for understanding digital weaponry.

    Cyber Threats

    • Types of cyber threats:
      • Cyber attacks: an attempt by hackers to damage or destroy a computer network or system.
      • Cyber threats: a probability that a specific type of attack may occur.
    • Categories of cyber threats based on intent:
      • Financial gain
      • Disruption
      • Espionage
      • Corporate espionage

    Types of Cybersecurity Threats

    • Phishing: an email-borne attack that involves tricking the email recipient into disclosing confidential information or downloading malware.
    • Spear Phishing: a more sophisticated form of phishing where the attacker learns about the victim and impersonates someone they know and trust.
    • Ransomware: an attack that involves encrypting data on the target system and demanding a ransom in exchange for letting the user have access to the data again.
    • Malware: a common cyberattack where malware executes unauthorized actions on the victim's system.
    • Adware: a form of malware that hides on a device and serves advertisements, monitoring online behavior to target specific ads.
    • Spyware: malicious software designed to enter a computer device, gather data about the user, and forward it to a third-party without consent.
    • Trojans: a type of malware that enters a target system looking like a standard piece of software, but then releases malicious code.
    • Virus: a type of self-propagating malware that infects other programs or files of a target system.
    • Worms: malware designed to propagate itself into other systems, often without user interaction.
    • Denial of Service (DoS) attack: where an attacker takes over many devices and uses them to invoke the functions of a target system, causing it to crash from an overload of demand.
    • Attacks on IoT Devices: IoT devices are vulnerable to multiple types of cyber threats, including hackers taking over the device to make it part of a DDoS attack and unauthorized access to data being collected.
    • Data Breaches: a theft of data by a malicious actor, often motivated by crime, a desire to embarrass an institution, or espionage.

    Safeguarding

    • Cyber safety tips:
      • Do not open email attachments from unknown senders.
      • Use strong passwords that are not easily guessable.
      • Use anti-virus software to detect and remove threats.
      • Always update operating systems and software.
    • Online safety is important regardless of age or life stage, especially with the increasing integration of the internet into daily life.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Cyber Security Term 2 PDF

    Description

    This quiz covers important terms and concepts in cyber security, including types of cyber threats and cyber defence for individuals.

    More Like This

    Cyber Security Term 3
    15 questions

    Cyber Security Term 3

    CapableTsavorite avatar
    CapableTsavorite
    Cyber Security Term 2 Quiz
    19 questions
    Cyber Security Term 3 Gr 8 class test
    22 questions
    Use Quizgecko on...
    Browser
    Browser