Cybersecurity and Hacking Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is NOT a common threat to information security due to human error or failure?

  • Accidental deletion or modification of data
  • Revelation of classified data
  • Entry of erroneous data
  • Unauthorized accessing of information (correct)

Which of the following service issues can dramatically affect the availability of information and systems?

  • Hardware upgrades
  • Software updates
  • Backup procedures
  • Power irregularities (correct)

What is the primary purpose of espionage or trespass in the context of information security?

  • To breach confidentiality of information (correct)
  • To improve the quality of service provided
  • To ensure the availability of information and systems
  • To prevent human errors or failures

Which of the following is NOT a common threat to information security due to deviations in quality of service by service providers?

<p>Software vulnerabilities (D)</p> Signup and view all the answers

Which of the following is the LEAST effective way to prevent threats to information security caused by human error or failure?

<p>Encouraging employees to take more breaks (B)</p> Signup and view all the answers

Which of the following is NOT a common threat to information security due to espionage or trespass?

<p>Accidental deletion or modification of data (C)</p> Signup and view all the answers

What type of malicious code is designed to spread across networks by replicating itself?

<p>Worm (C)</p> Signup and view all the answers

Which of the following is an example of a deliberate act of theft in cybersecurity?

<p>Stealing credit card numbers from a company's database (C)</p> Signup and view all the answers

What is the primary function of a software firewall?

<p>To control incoming and outgoing network traffic based on predefined rules (B)</p> Signup and view all the answers

Which of the following is NOT a common force of nature that can impact cybersecurity?

<p>Cyber attacks (D)</p> Signup and view all the answers

What type of hardware failure can lead to data loss or corruption in cybersecurity?

<p>A malfunctioning hard drive (C)</p> Signup and view all the answers

What is the term used for stealing intellectual property, such as software or trade secrets?

<p>Piracy (D)</p> Signup and view all the answers

What is the most common type of intellectual property breach?

<p>Software piracy (D)</p> Signup and view all the answers

Which organization investigates software piracy and intellectual property breaches?

<p>Both SIIA and BSA (A)</p> Signup and view all the answers

Which of the following is NOT an example of a force of nature that can disrupt information systems?

<p>Power surge (D)</p> Signup and view all the answers

What is the term used for technical hardware failures or errors that occur when a manufacturer distributes flawed equipment?

<p>Bugs (B)</p> Signup and view all the answers

Which type of attack involves sending a large number of connection or information requests to a target system, potentially causing it to crash or become unable to perform ordinary functions?

<p>Denial-of-service (DoS) (B)</p> Signup and view all the answers

What is the term used for a technique where an attacker sends messages to a computer with an IP address indicating that the message is coming from a trusted host?

<p>Spoofing (D)</p> Signup and view all the answers

Which type of attack involves an attacker monitoring and modifying data traveling over a network?

<p>Man-in-the-Middle (D)</p> Signup and view all the answers

What is the term used for a program or device that can monitor data traveling over a network?

<p>Sniffer (A)</p> Signup and view all the answers

Which of the following is NOT a type of malicious code mentioned in the text?

<p>Ransomware (B)</p> Signup and view all the answers

What is the term used for a technique where an attacker tries every possible combination of options to guess a password?

<p>Brute force attack (A)</p> Signup and view all the answers

Flashcards

Unauthorized Access

Gaining unauthorized access to information.

Power Irregularities

Issues such as voltage spikes or complete blackouts.

Espionage/Trespass Purpose

To secretly access confidential data.

Worm

Malicious code that replicates across networks.

Signup and view all the flashcards

Theft

Illegally obtaining credit card details.

Signup and view all the flashcards

Software Firewall

Controls network traffic based on set rules.

Signup and view all the flashcards

Malfunctioning Hard Drive

A faulty hard drive.

Signup and view all the flashcards

Piracy

Copying or distributing software without permission.

Signup and view all the flashcards

Most Common IP Breach

Software piracy.

Signup and view all the flashcards

Bugs

Technical flaws in hardware released by manufacturers.

Signup and view all the flashcards

Denial-of-Service (DoS)

Overwhelming a system with connection requests.

Signup and view all the flashcards

Spoofing

Falsifying the IP address to appear as a trusted host.

Signup and view all the flashcards

Man-in-the-Middle

Intercepting and altering network data.

Signup and view all the flashcards

Sniffer

Monitors network data.

Signup and view all the flashcards

Brute Force Attack

Trying all password combinations.

Signup and view all the flashcards

More Like This

Internet Threats and Hacking
10 questions

Internet Threats and Hacking

LaudableAlexandrite avatar
LaudableAlexandrite
Cybersecurity: SQL Injection & Hacking Techniques
292 questions
Use Quizgecko on...
Browser
Browser