Cybersecurity Threats

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary objective of cybersecurity?

  • To create false data streams
  • To protect digital information and services from malicious attacks (correct)
  • To analyze the characteristics of packet frequency and length
  • To monitor network traffic

What type of attack involves modifying or fabricating data streams?

  • Eavesdropping attack
  • Traffic analysis attack
  • Active attack (correct)
  • Passive attack

What is the outcome of a successful passive attack?

  • Disruption of network operations
  • Modification of data streams
  • Creation of false data streams
  • Access to confidential and important information (correct)

What type of attack involves an attacker that is located outside the network?

<p>External Attack (B)</p> Signup and view all the answers

What is an example of a passive attack?

<p>Eavesdropping on network traffic (D)</p> Signup and view all the answers

What is the primary difference between a Denial-of-Service (DoS) attack and a Distributed Denial-of-Service (DDoS) attack?

<p>The number of host machines infected by malicious software (A)</p> Signup and view all the answers

What is the primary goal of a Denial-of-Service (DoS) attack?

<p>To overpower a system's resources (D)</p> Signup and view all the answers

What is the primary difference between passive and active attacks?

<p>The attacker's ability to modify data streams (A)</p> Signup and view all the answers

Why are internal attacks more difficult to detect than external attacks?

<p>Because internal attackers are hidden among legitimate nodes (B)</p> Signup and view all the answers

What can be the result of an active attack on a network?

<p>Unavailability of network services (C)</p> Signup and view all the answers

What type of attack is characterized by an attacker that is a legitimate node within the network?

<p>Internal Attack (D)</p> Signup and view all the answers

What is the primary purpose of a firewall in preventing cyber attacks?

<p>To prevent malicious nodes from accessing the network (D)</p> Signup and view all the answers

What is the primary goal of social engineering techniques?

<p>to exploit human error to gain private information access (B)</p> Signup and view all the answers

What is the primary purpose of a dictionary attack?

<p>to use a list of common passwords to gain access to a user's computer and network (D)</p> Signup and view all the answers

What is the typical objective of a password attack?

<p>to obtain unauthorized access to an information system (D)</p> Signup and view all the answers

What is a common method used to obtain user passwords?

<p>sniffing the connection to the network to get unencrypted passwords (A)</p> Signup and view all the answers

What is the primary characteristic of a SQL injection attack?

<p>injecting malicious code into database queries (B)</p> Signup and view all the answers

What is a common outcome of a successful social engineering attack?

<p>installation of malware (C)</p> Signup and view all the answers

What happens when a client connects to a server in a Man-in-the-middle attack?

<p>The attacker's computer gains control of the client. (B)</p> Signup and view all the answers

What is the purpose of an ARP packet?

<p>To convert an IP address into a physical address. (A)</p> Signup and view all the answers

What is the goal of a phishing attack?

<p>To steal user data, including login credentials and credit card numbers. (C)</p> Signup and view all the answers

What happens in ARP spoofing?

<p>The attacker's MAC address is linked with the IP address of a user on a local area network. (D)</p> Signup and view all the answers

What is the result of ARP spoofing?

<p>Data sent by the user is transmitted to the attacker. (A)</p> Signup and view all the answers

How does a phishing attack occur?

<p>When a user opens an email, instant message, or text message from a trusted entity. (D)</p> Signup and view all the answers

What happens when a program virus is active?

<p>It infects other programs on the computer (B)</p> Signup and view all the answers

What is the main purpose of spyware?

<p>To steal private information from a computer system (B)</p> Signup and view all the answers

What is the primary function of a backdoor?

<p>To grant the cyber criminals future access to the system (D)</p> Signup and view all the answers

What happens when a computer system is affected by ransomware?

<p>It encrypts data in the computer with a key unknown to the user (C)</p> Signup and view all the answers

What is the purpose of a keylogger?

<p>To record everything the user types on their computer system (D)</p> Signup and view all the answers

What is the main difference between a virus and a worm?

<p>A virus needs a host program to run (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Cyber Security Threats
10 questions

Cyber Security Threats

CelebratoryCommonsense avatar
CelebratoryCommonsense
Cyber Attacks and Threats
25 questions
Cyber Security: Network Threats
36 questions
Use Quizgecko on...
Browser
Browser