Cybersecurity Threats and Attacks Quiz 5.3 hard
30 Questions
6 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the percentage of websites with at least one SERIOUS vulnerability according to the WhiteHat Website Security Statistics Report (2013-2014)?

  • 93%
  • 72%
  • 86% (correct)
  • 64%
  • Which type of vulnerability is ranked as the #1 vulnerability according to the WhiteHat Website Security Statistics Report (2013-2014)?

  • SQL Injection
  • Cross-Site Scripting (XSS) (correct)
  • Cross-Site Request Forgery (CSRF)
  • Remote Code Execution
  • What is the average number of open SERIOUS vulnerabilities per website according to the WhiteHat Website Security Statistics Report (2013-2014)?

  • 78
  • 56 (correct)
  • 32
  • 41
  • According to the Symantec Internet Security Threat Report, how often was a new Zero-Day Vulnerability discovered on average in 2015?

    <p>Each week</p> Signup and view all the answers

    Why are Amex cards more expensive according to the lecture?

    <p>Higher spending limit</p> Signup and view all the answers

    What is the main incentive for hacking as per the lecture?

    <p>Huge market demand</p> Signup and view all the answers

    What is a zero-day vulnerability?

    <p>A flaw exploited by attackers before a patch is available</p> Signup and view all the answers

    What is Diceware's word list size for passphrases?

    <p>7,776 English words</p> Signup and view all the answers

    Who is the original author of NIST 2003 password guidelines?

    <p>Bill Burr</p> Signup and view all the answers

    What is the primary defense mechanism to stop XSS?

    <p>Contextual output encoding/escaping</p> Signup and view all the answers

    How do many web applications mitigate XSS threats related to session cookies?

    <p>Tie session cookies to the IP address of the user</p> Signup and view all the answers

    What type of attacks occur when an application does not properly validate user supplied input?

    <p>Injection attacks</p> Signup and view all the answers

    What does 'Clickjacking' involve?

    <p>Tricking users into clicking something without their knowledge</p> Signup and view all the answers

    What does JSONP (JSON with Padding) aim to bypass?

    <p>Same-origin policy</p> Signup and view all the answers

    What is the main function of TOR?

    <p>To provide an anonymous path between the user and the sites they visit</p> Signup and view all the answers

    Which type of web can only be accessed by individuals with logins for the websites?

    <p>Invisible Web</p> Signup and view all the answers

    What is the purpose of The Onion Router (TOR) software?

    <p>To provide access to the Dark Web</p> Signup and view all the answers

    What is the key characteristic of the Surface Web?

    <p>All content is public, searchable, and mostly friendly</p> Signup and view all the answers

    What is the protective layer that sits between the User and the Internet in the TOR network?

    <p>The Onion Router</p> Signup and view all the answers

    What is the main distinguishing factor of the Dark Web?

    <p>It is accessible only through TOR software</p> Signup and view all the answers

    How does TOR conceal a user's location and usage?

    <p>By directing Internet traffic through a free, worldwide, volunteer overlay network</p> Signup and view all the answers

    What is the primary purpose of the Invisible Web (intranet)?

    <p>To host content that can only be accessed by login credentials</p> Signup and view all the answers

    What is the main characteristic of the Deep Web?

    <p>It includes content not indexed by search engines</p> Signup and view all the answers

    What is the correct statement about ransomware attacks?

    <p>They involve encrypting files and demanding a ransom for the decryption key.</p> Signup and view all the answers

    What is a common characteristic of weak passwords?

    <p>They are frequently used, such as '123456' and 'Password1.'</p> Signup and view all the answers

    What is a key feature of phishing attacks?

    <p>They involve using spam email to gain control of accounts through link clicks.</p> Signup and view all the answers

    What type of attacks involve guessing unique user authentication data?

    <p>Brute force attacks</p> Signup and view all the answers

    What is a characteristic of cross-site scripting (XSS) attacks?

    <p>They involve injecting malicious scripts into web pages viewed by other users.</p> Signup and view all the answers

    What is the characteristic of a 0-day vulnerability?

    <p>It is a vulnerability that is unknown to the software vendor.</p> Signup and view all the answers

    What is a characteristic of the group Anonymous?

    <p>They are an international group of criminal hackers responsible for significant cyberattacks.</p> Signup and view all the answers

    Study Notes

    Cybersecurity Threats and Attacks

    • An exploit is no longer a 0-day vulnerability once the company or website becomes aware of it.
    • About 13% of requests are exploiting malware variants, and creating 10 variants of a good virus is common.
    • Wannacry attacks targeted hospitals and 5.4 billion of them were blocked.
    • There has been a 600% increase in attacks against IoT devices.
    • Phishing involves using spam email to gain control of accounts through link clicks.
    • Ransomware attacks involve encrypting files and demanding a ransom for the decryption key.
    • Anonymous is an international group of criminal hackers responsible for significant cyberattacks.
    • Anonymous recently declared a "cyber war" against Russia and hacked numerous Russian internet providers and government websites.
    • Common web attacks include cross-site scripting (XSS) and SQL injection attacks.
    • Brute force attacks involve guessing unique user authentication data, and they can be normal or reverse.
    • Insufficient authentication and weak password recovery validation are common vulnerabilities.
    • Weak passwords, including "123456" and "Password1," are frequently used and can be replaced with more secure passphrases.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge of cybersecurity threats and attacks with this quiz. Learn about common vulnerabilities, types of attacks, and recent cyber incidents. Keep up with the latest trends in cybersecurity and enhance your understanding of important concepts to stay protected in the digital world.

    More Like This

    Cybersecurity Threats Overview
    8 questions
    Basics of Cybersecurity: Threats & Vulnerabilities
    48 questions
    Use Quizgecko on...
    Browser
    Browser