Cybersecurity Threats
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary objective of cybersecurity?

  • To create false data streams
  • To protect digital information and services from malicious attacks (correct)
  • To analyze the characteristics of packet frequency and length
  • To monitor network traffic
  • What type of attack involves modifying or fabricating data streams?

  • Eavesdropping attack
  • Traffic analysis attack
  • Active attack (correct)
  • Passive attack
  • What is the outcome of a successful passive attack?

  • Disruption of network operations
  • Modification of data streams
  • Creation of false data streams
  • Access to confidential and important information (correct)
  • What type of attack involves an attacker that is located outside the network?

    <p>External Attack (B)</p> Signup and view all the answers

    What is an example of a passive attack?

    <p>Eavesdropping on network traffic (D)</p> Signup and view all the answers

    What is the primary difference between a Denial-of-Service (DoS) attack and a Distributed Denial-of-Service (DDoS) attack?

    <p>The number of host machines infected by malicious software (A)</p> Signup and view all the answers

    What is the primary goal of a Denial-of-Service (DoS) attack?

    <p>To overpower a system's resources (D)</p> Signup and view all the answers

    What is the primary difference between passive and active attacks?

    <p>The attacker's ability to modify data streams (A)</p> Signup and view all the answers

    Why are internal attacks more difficult to detect than external attacks?

    <p>Because internal attackers are hidden among legitimate nodes (B)</p> Signup and view all the answers

    What can be the result of an active attack on a network?

    <p>Unavailability of network services (C)</p> Signup and view all the answers

    What type of attack is characterized by an attacker that is a legitimate node within the network?

    <p>Internal Attack (D)</p> Signup and view all the answers

    What is the primary purpose of a firewall in preventing cyber attacks?

    <p>To prevent malicious nodes from accessing the network (D)</p> Signup and view all the answers

    What is the primary goal of social engineering techniques?

    <p>to exploit human error to gain private information access (B)</p> Signup and view all the answers

    What is the primary purpose of a dictionary attack?

    <p>to use a list of common passwords to gain access to a user's computer and network (D)</p> Signup and view all the answers

    What is the typical objective of a password attack?

    <p>to obtain unauthorized access to an information system (D)</p> Signup and view all the answers

    What is a common method used to obtain user passwords?

    <p>sniffing the connection to the network to get unencrypted passwords (A)</p> Signup and view all the answers

    What is the primary characteristic of a SQL injection attack?

    <p>injecting malicious code into database queries (B)</p> Signup and view all the answers

    What is a common outcome of a successful social engineering attack?

    <p>installation of malware (C)</p> Signup and view all the answers

    What happens when a client connects to a server in a Man-in-the-middle attack?

    <p>The attacker's computer gains control of the client. (B)</p> Signup and view all the answers

    What is the purpose of an ARP packet?

    <p>To convert an IP address into a physical address. (A)</p> Signup and view all the answers

    What is the goal of a phishing attack?

    <p>To steal user data, including login credentials and credit card numbers. (C)</p> Signup and view all the answers

    What happens in ARP spoofing?

    <p>The attacker's MAC address is linked with the IP address of a user on a local area network. (D)</p> Signup and view all the answers

    What is the result of ARP spoofing?

    <p>Data sent by the user is transmitted to the attacker. (A)</p> Signup and view all the answers

    How does a phishing attack occur?

    <p>When a user opens an email, instant message, or text message from a trusted entity. (D)</p> Signup and view all the answers

    What happens when a program virus is active?

    <p>It infects other programs on the computer (B)</p> Signup and view all the answers

    What is the main purpose of spyware?

    <p>To steal private information from a computer system (B)</p> Signup and view all the answers

    What is the primary function of a backdoor?

    <p>To grant the cyber criminals future access to the system (D)</p> Signup and view all the answers

    What happens when a computer system is affected by ransomware?

    <p>It encrypts data in the computer with a key unknown to the user (C)</p> Signup and view all the answers

    What is the purpose of a keylogger?

    <p>To record everything the user types on their computer system (D)</p> Signup and view all the answers

    What is the main difference between a virus and a worm?

    <p>A virus needs a host program to run (B)</p> Signup and view all the answers

    More Like This

    Cyber Security Threats
    10 questions

    Cyber Security Threats

    CelebratoryCommonsense avatar
    CelebratoryCommonsense
    Cyber Attacks and Threats
    25 questions
    Cyber Security: Network Threats
    36 questions
    Use Quizgecko on...
    Browser
    Browser