Cybersecurity Threats and Attacks Quiz 5.3 hard

AttentivePink avatar
AttentivePink
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the percentage of websites with at least one SERIOUS vulnerability according to the WhiteHat Website Security Statistics Report (2013-2014)?

86%

Which type of vulnerability is ranked as the #1 vulnerability according to the WhiteHat Website Security Statistics Report (2013-2014)?

Cross-Site Scripting (XSS)

What is the average number of open SERIOUS vulnerabilities per website according to the WhiteHat Website Security Statistics Report (2013-2014)?

56

According to the Symantec Internet Security Threat Report, how often was a new Zero-Day Vulnerability discovered on average in 2015?

<p>Each week</p> Signup and view all the answers

Why are Amex cards more expensive according to the lecture?

<p>Higher spending limit</p> Signup and view all the answers

What is the main incentive for hacking as per the lecture?

<p>Huge market demand</p> Signup and view all the answers

What is a zero-day vulnerability?

<p>A flaw exploited by attackers before a patch is available</p> Signup and view all the answers

What is Diceware's word list size for passphrases?

<p>7,776 English words</p> Signup and view all the answers

Who is the original author of NIST 2003 password guidelines?

<p>Bill Burr</p> Signup and view all the answers

What is the primary defense mechanism to stop XSS?

<p>Contextual output encoding/escaping</p> Signup and view all the answers

How do many web applications mitigate XSS threats related to session cookies?

<p>Tie session cookies to the IP address of the user</p> Signup and view all the answers

What type of attacks occur when an application does not properly validate user supplied input?

<p>Injection attacks</p> Signup and view all the answers

What does 'Clickjacking' involve?

<p>Tricking users into clicking something without their knowledge</p> Signup and view all the answers

What does JSONP (JSON with Padding) aim to bypass?

<p>Same-origin policy</p> Signup and view all the answers

What is the main function of TOR?

<p>To provide an anonymous path between the user and the sites they visit</p> Signup and view all the answers

Which type of web can only be accessed by individuals with logins for the websites?

<p>Invisible Web</p> Signup and view all the answers

What is the purpose of The Onion Router (TOR) software?

<p>To provide access to the Dark Web</p> Signup and view all the answers

What is the key characteristic of the Surface Web?

<p>All content is public, searchable, and mostly friendly</p> Signup and view all the answers

What is the protective layer that sits between the User and the Internet in the TOR network?

<p>The Onion Router</p> Signup and view all the answers

What is the main distinguishing factor of the Dark Web?

<p>It is accessible only through TOR software</p> Signup and view all the answers

How does TOR conceal a user's location and usage?

<p>By directing Internet traffic through a free, worldwide, volunteer overlay network</p> Signup and view all the answers

What is the primary purpose of the Invisible Web (intranet)?

<p>To host content that can only be accessed by login credentials</p> Signup and view all the answers

What is the main characteristic of the Deep Web?

<p>It includes content not indexed by search engines</p> Signup and view all the answers

What is the correct statement about ransomware attacks?

<p>They involve encrypting files and demanding a ransom for the decryption key.</p> Signup and view all the answers

What is a common characteristic of weak passwords?

<p>They are frequently used, such as '123456' and 'Password1.'</p> Signup and view all the answers

What is a key feature of phishing attacks?

<p>They involve using spam email to gain control of accounts through link clicks.</p> Signup and view all the answers

What type of attacks involve guessing unique user authentication data?

<p>Brute force attacks</p> Signup and view all the answers

What is a characteristic of cross-site scripting (XSS) attacks?

<p>They involve injecting malicious scripts into web pages viewed by other users.</p> Signup and view all the answers

What is the characteristic of a 0-day vulnerability?

<p>It is a vulnerability that is unknown to the software vendor.</p> Signup and view all the answers

What is a characteristic of the group Anonymous?

<p>They are an international group of criminal hackers responsible for significant cyberattacks.</p> Signup and view all the answers

Study Notes

Cybersecurity Threats and Attacks

  • An exploit is no longer a 0-day vulnerability once the company or website becomes aware of it.
  • About 13% of requests are exploiting malware variants, and creating 10 variants of a good virus is common.
  • Wannacry attacks targeted hospitals and 5.4 billion of them were blocked.
  • There has been a 600% increase in attacks against IoT devices.
  • Phishing involves using spam email to gain control of accounts through link clicks.
  • Ransomware attacks involve encrypting files and demanding a ransom for the decryption key.
  • Anonymous is an international group of criminal hackers responsible for significant cyberattacks.
  • Anonymous recently declared a "cyber war" against Russia and hacked numerous Russian internet providers and government websites.
  • Common web attacks include cross-site scripting (XSS) and SQL injection attacks.
  • Brute force attacks involve guessing unique user authentication data, and they can be normal or reverse.
  • Insufficient authentication and weak password recovery validation are common vulnerabilities.
  • Weak passwords, including "123456" and "Password1," are frequently used and can be replaced with more secure passphrases.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Cybersecurity Threats Overview
7 questions
Cybersecurity Threats
8 questions
Use Quizgecko on...
Browser
Browser