Master the Art of Cybersecurity
26 Questions
0 Views

Master the Art of Cybersecurity

Created by
@LucrativeMagenta

Questions and Answers

Which of the following is NOT one of the four categories of cybersecurity attacks mentioned in the text?

  • Modification
  • Fabrication
  • Interception
  • Interruption (correct)
  • What is the purpose of a fabrication attack?

  • To gain trust in a compromised system
  • To collect data for illicit use
  • To create illegitimate information within a system (correct)
  • To reduce confidence in genuine data
  • Which of the following is a potential consequence of a fabrication attack?

  • Increased confidence in genuine data
  • Elimination of cybersecurity attacks
  • Reduced number of internet-connected devices
  • Decreased trust in a compromised system (correct)
  • Which category of cyber-attack primarily targets data confidentiality?

    <p>Interception</p> Signup and view all the answers

    Which category of cyber-attack primarily targets data availability?

    <p>Interruption</p> Signup and view all the answers

    Which category of cyber-attack primarily targets data integrity?

    <p>Modification</p> Signup and view all the answers

    Which category of cyber-attack involves injecting bogus data or creating false trails in the system?

    <p>Fabrication</p> Signup and view all the answers

    Which tool can be used to monitor MAC to IP address mappings?

    <p>Arpwatch</p> Signup and view all the answers

    What is the purpose of Dynamic ARP Inspection (DAI)?

    <p>To prevent layer two and layer three spoofing attacks</p> Signup and view all the answers

    Which type of switches is DAI and CIS available on?

    <p>Catalyst switches using native mode (Cisco IOS)</p> Signup and view all the answers

    Which type of attack primarily affects the integrity of data but could also be considered an availability attack?

    <p>Modification attack</p> Signup and view all the answers

    What is an example of an interception attack?

    <p>Unauthorized file viewing</p> Signup and view all the answers

    Which attack involves generating data, processes, communications, or other similar activities with a system?

    <p>Fabrication attack</p> Signup and view all the answers

    What is the major attack discovered in studies of file sharing system security?

    <p>Theft attack</p> Signup and view all the answers

    Which of the following is NOT a type of attack discussed in the text?

    <p>Route protocol attack</p> Signup and view all the answers

    What is the term used to describe a program that reproduces by introducing a copy of itself and infecting another computer or device without permission or knowledge of the user?

    <p>Virus</p> Signup and view all the answers

    Which type of attack exploits weaknesses in a network's privacy by intercepting a message and keeping a copy of it?

    <p>Message interception attack</p> Signup and view all the answers

    What is the term used to describe situations in which an attacker masquerades as a genuine employee and tricks a third party into divulging information that will allow the attacker access to the system?

    <p>Social engineering attack</p> Signup and view all the answers

    Which type of attack is characterized by the manipulation of peers to issue simultaneous multimedia downloads or streaming, causing heavy traffic and network congestion?

    <p>Bandwidth clogging attack</p> Signup and view all the answers

    What is the main goal of the RIAA and Barker mentioned in the text?

    <p>To prevent unauthorized copying and online distribution of music files</p> Signup and view all the answers

    What is a common characteristic of DDoS attacks?

    <p>They utilize a large number of distributed or peer resources</p> Signup and view all the answers

    What is the most aggressive type of P2P-DDoS attack mentioned in the text?

    <p>DC++ attack</p> Signup and view all the answers

    Which of the following is a common offline attack method used to crack a UNIX shadow file?

    <p>Using joe-doe or killer-crack</p> Signup and view all the answers

    What is a common consequence of ARP redirection attacks?

    <p>The attacker can insert themselves in the middle of a conversation</p> Signup and view all the answers

    Which of the following is NOT a method used in ARP-based attacks?

    <p>ARP encryption</p> Signup and view all the answers

    Why can any user sniff traffic on a switched network despite it being fully switched to the desktop?

    <p>ARP has no provision for authenticating queries or query replies</p> Signup and view all the answers

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser