Cybersecurity Concepts Quiz
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is social engineering?

  • Manipulating people to force mistakes and compromise security (correct)
  • Acquiring multiple computers to access a website
  • Using trial and error to hack an account
  • A method to bring down websites by overwhelming the web server
  • How do criminals conduct a Brute Force Attack?

  • By trying various passwords against a specific username (correct)
  • By injecting malicious code into a website
  • By overwhelming web servers with traffic
  • By manipulating people to reveal their passwords
  • How can the threat of a Brute Force Attack be reduced?

  • By allowing unlimited login attempts
  • By locking an account after one unsuccessful password attempt
  • By using complex passwords for all users (correct)
  • By ensuring all users have simple passwords
  • What does a 'packet sniffer' do?

    <p>Intercepts and reads network traffic to gather sensitive data</p> Signup and view all the answers

    Why do criminals use social engineering tactics?

    <p>To manipulate individuals into giving confidential information</p> Signup and view all the answers

    How does a DDoS attack aim to bring down a website?

    <p>By overwhelming the web server with excessive traffic</p> Signup and view all the answers

    What is the main goal of Scareware?

    <p>To claim the user has a virus and sell fake antivirus software</p> Signup and view all the answers

    Which type of malware demands payment to unlock a computer that has been made useless?

    <p>Ransomware</p> Signup and view all the answers

    What best describes Rootkits?

    <p>Tools that allow criminals to access a computer at an administrator level</p> Signup and view all the answers

    How does Phishing typically attempt to obtain sensitive user information?

    <p>Through direct electronic communications like emails or phone calls</p> Signup and view all the answers

    'Social Engineering' in network attacks refers to:

    <p>Exploiting human behavior to compromise network security</p> Signup and view all the answers

    What is the main purpose of a standard computer virus?

    <p>To replicate themselves in other programs/files</p> Signup and view all the answers

    'Denial of Service Attacks (DoS)' aim to:

    <p>Overwhelm a system with traffic, making it inaccessible</p> Signup and view all the answers

    Which type of virus aims to simply replicate itself without necessarily damaging data?

    <p>Worm Virus</p> Signup and view all the answers

    What is the primary aim of a Trojan virus?

    <p>To cause harm while appearing harmless</p> Signup and view all the answers

    Which type of attack involves overwhelming a system with excessive traffic, rendering it unable to respond to legitimate requests?

    <p>Denial of Service</p> Signup and view all the answers

    What is the primary goal of malware?

    <p>To harm a computer or user</p> Signup and view all the answers

    In the context of cybersecurity, which is considered a 'weak point' according to the text?

    <p>'Weak' passwords</p> Signup and view all the answers

    What is the purpose of penetration testing?

    <p>To simulate network attacks and identify weaknesses</p> Signup and view all the answers

    Which of the following is NOT a method to prevent threats to a computer system?

    <p>Network Forensics</p> Signup and view all the answers

    What is the main function of network forensics?

    <p>To monitor network traffic and analyze data packets</p> Signup and view all the answers

    Which of the following best defines a 'Network Policy'?

    <p>Set of rules and procedures for network users</p> Signup and view all the answers

    What type of attacks might be simulated during penetration testing?

    <p>Denial of Service attacks, SQL injections, Brute Force Attacks</p> Signup and view all the answers

    Which method can be used to identify shortcomings in a network according to the text?

    <p>Network Forensics</p> Signup and view all the answers

    What is one common rule that might be included in an ‘Acceptable Use Policy’?

    <p>Locking computers if the user leaves their desk</p> Signup and view all the answers

    Which of the following is a common aspect of a ‘Backup Policy’?

    <p>The location of backup storage (offsite)</p> Signup and view all the answers

    In a ‘Disaster Recovery Policy’, what is one rule typically related to the media on which backups are stored?

    <p>The location of the backups in a company's servers</p> Signup and view all the answers

    How does Anti-Virus software ensure system security?

    <p>It finds and destroys viruses or quarantines them.</p> Signup and view all the answers

    Which of the following is NOT typically a part of an ‘Acceptable Use Policy’?

    <p>Installing any software without restrictions</p> Signup and view all the answers

    What is one critical aspect of a ‘Backup Policy’ that organizations need to consider?

    <p>The time and frequency of backing up data</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser