Cybersecurity Threats and Attacks Quiz 5.3 hard

AttentivePink avatar
AttentivePink
·
·
Download

Start Quiz

Study Flashcards

30 Questions

What is the percentage of websites with at least one SERIOUS vulnerability according to the WhiteHat Website Security Statistics Report (2013-2014)?

86%

Which type of vulnerability is ranked as the #1 vulnerability according to the WhiteHat Website Security Statistics Report (2013-2014)?

Cross-Site Scripting (XSS)

What is the average number of open SERIOUS vulnerabilities per website according to the WhiteHat Website Security Statistics Report (2013-2014)?

56

According to the Symantec Internet Security Threat Report, how often was a new Zero-Day Vulnerability discovered on average in 2015?

Each week

Why are Amex cards more expensive according to the lecture?

Higher spending limit

What is the main incentive for hacking as per the lecture?

Huge market demand

What is a zero-day vulnerability?

A flaw exploited by attackers before a patch is available

What is Diceware's word list size for passphrases?

7,776 English words

Who is the original author of NIST 2003 password guidelines?

Bill Burr

What is the primary defense mechanism to stop XSS?

Contextual output encoding/escaping

How do many web applications mitigate XSS threats related to session cookies?

Tie session cookies to the IP address of the user

What type of attacks occur when an application does not properly validate user supplied input?

Injection attacks

What does 'Clickjacking' involve?

Tricking users into clicking something without their knowledge

What does JSONP (JSON with Padding) aim to bypass?

Same-origin policy

What is the main function of TOR?

To provide an anonymous path between the user and the sites they visit

Which type of web can only be accessed by individuals with logins for the websites?

Invisible Web

What is the purpose of The Onion Router (TOR) software?

To provide access to the Dark Web

What is the key characteristic of the Surface Web?

All content is public, searchable, and mostly friendly

What is the protective layer that sits between the User and the Internet in the TOR network?

The Onion Router

What is the main distinguishing factor of the Dark Web?

It is accessible only through TOR software

How does TOR conceal a user's location and usage?

By directing Internet traffic through a free, worldwide, volunteer overlay network

What is the primary purpose of the Invisible Web (intranet)?

To host content that can only be accessed by login credentials

What is the main characteristic of the Deep Web?

It includes content not indexed by search engines

What is the correct statement about ransomware attacks?

They involve encrypting files and demanding a ransom for the decryption key.

What is a common characteristic of weak passwords?

They are frequently used, such as '123456' and 'Password1.'

What is a key feature of phishing attacks?

They involve using spam email to gain control of accounts through link clicks.

What type of attacks involve guessing unique user authentication data?

Brute force attacks

What is a characteristic of cross-site scripting (XSS) attacks?

They involve injecting malicious scripts into web pages viewed by other users.

What is the characteristic of a 0-day vulnerability?

It is a vulnerability that is unknown to the software vendor.

What is a characteristic of the group Anonymous?

They are an international group of criminal hackers responsible for significant cyberattacks.

Study Notes

Cybersecurity Threats and Attacks

  • An exploit is no longer a 0-day vulnerability once the company or website becomes aware of it.
  • About 13% of requests are exploiting malware variants, and creating 10 variants of a good virus is common.
  • Wannacry attacks targeted hospitals and 5.4 billion of them were blocked.
  • There has been a 600% increase in attacks against IoT devices.
  • Phishing involves using spam email to gain control of accounts through link clicks.
  • Ransomware attacks involve encrypting files and demanding a ransom for the decryption key.
  • Anonymous is an international group of criminal hackers responsible for significant cyberattacks.
  • Anonymous recently declared a "cyber war" against Russia and hacked numerous Russian internet providers and government websites.
  • Common web attacks include cross-site scripting (XSS) and SQL injection attacks.
  • Brute force attacks involve guessing unique user authentication data, and they can be normal or reverse.
  • Insufficient authentication and weak password recovery validation are common vulnerabilities.
  • Weak passwords, including "123456" and "Password1," are frequently used and can be replaced with more secure passphrases.

Test your knowledge of cybersecurity threats and attacks with this quiz. Learn about common vulnerabilities, types of attacks, and recent cyber incidents. Keep up with the latest trends in cybersecurity and enhance your understanding of important concepts to stay protected in the digital world.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

More Quizzes Like This

Cybersecurity Threats Overview
7 questions
Cybersecurity Threats Quiz
10 questions
Cybersecurity Threats
8 questions
Cybersecurity Threats
16 questions
Use Quizgecko on...
Browser
Browser