Cybersecurity Threats and Attacks Quiz 5.3 hard

AttentivePink avatar
AttentivePink
·

Start Quiz

Study Flashcards

30 Questions

What is the percentage of websites with at least one SERIOUS vulnerability according to the WhiteHat Website Security Statistics Report (2013-2014)?

Which type of vulnerability is ranked as the #1 vulnerability according to the WhiteHat Website Security Statistics Report (2013-2014)?

What is the average number of open SERIOUS vulnerabilities per website according to the WhiteHat Website Security Statistics Report (2013-2014)?

According to the Symantec Internet Security Threat Report, how often was a new Zero-Day Vulnerability discovered on average in 2015?

Why are Amex cards more expensive according to the lecture?

What is the main incentive for hacking as per the lecture?

What is a zero-day vulnerability?

What is Diceware's word list size for passphrases?

Who is the original author of NIST 2003 password guidelines?

What is the primary defense mechanism to stop XSS?

How do many web applications mitigate XSS threats related to session cookies?

What type of attacks occur when an application does not properly validate user supplied input?

What does 'Clickjacking' involve?

What does JSONP (JSON with Padding) aim to bypass?

What is the main function of TOR?

Which type of web can only be accessed by individuals with logins for the websites?

What is the purpose of The Onion Router (TOR) software?

What is the key characteristic of the Surface Web?

What is the protective layer that sits between the User and the Internet in the TOR network?

What is the main distinguishing factor of the Dark Web?

How does TOR conceal a user's location and usage?

What is the primary purpose of the Invisible Web (intranet)?

What is the main characteristic of the Deep Web?

What is the correct statement about ransomware attacks?

What is a common characteristic of weak passwords?

What is a key feature of phishing attacks?

What type of attacks involve guessing unique user authentication data?

What is a characteristic of cross-site scripting (XSS) attacks?

What is the characteristic of a 0-day vulnerability?

What is a characteristic of the group Anonymous?

Summary

Cybersecurity Threats and Attacks

  • An exploit is no longer a 0-day vulnerability once the company or website becomes aware of it.
  • About 13% of requests are exploiting malware variants, and creating 10 variants of a good virus is common.
  • Wannacry attacks targeted hospitals and 5.4 billion of them were blocked.
  • There has been a 600% increase in attacks against IoT devices.
  • Phishing involves using spam email to gain control of accounts through link clicks.
  • Ransomware attacks involve encrypting files and demanding a ransom for the decryption key.
  • Anonymous is an international group of criminal hackers responsible for significant cyberattacks.
  • Anonymous recently declared a "cyber war" against Russia and hacked numerous Russian internet providers and government websites.
  • Common web attacks include cross-site scripting (XSS) and SQL injection attacks.
  • Brute force attacks involve guessing unique user authentication data, and they can be normal or reverse.
  • Insufficient authentication and weak password recovery validation are common vulnerabilities.
  • Weak passwords, including "123456" and "Password1," are frequently used and can be replaced with more secure passphrases.

Description

Test your knowledge of cybersecurity threats and attacks with this quiz. Learn about common vulnerabilities, types of attacks, and recent cyber incidents. Keep up with the latest trends in cybersecurity and enhance your understanding of important concepts to stay protected in the digital world.

Make Your Own Quiz

Transform your notes into a shareable quiz, with AI.

Get started for free
Use Quizgecko on...
Browser
Browser