Questions and Answers
Which term refers to a program or piece of code designed to take advantage of a security flaw or vulnerability?
Exploit
What are acts performed by individuals with harmful intent, whose goal is to steal data or cause damage to computing systems?
Threats
Which term is used to describe a risk that can potentially harm computer systems and networks?
Threats
What is the term used to describe weaknesses or flaws in a system or application that can be exploited by hackers?
Signup and view all the answers
Which category of cyber threats involves the use of software designed to infiltrate or damage a computer system?
Signup and view all the answers
Which type of cyberattack is the most common?
Signup and view all the answers
Which type of malware exploits software vulnerabilities and backdoors to gain access to an operating system?
Signup and view all the answers
Which type of cyberattack can manipulate and block access to network components?
Signup and view all the answers
What is the abbreviation for 'malicious software'?
Signup and view all the answers
How does malware typically gain access to a system?
Signup and view all the answers