Understanding forms of attack

Cards (70)

  • What is the primary purpose of network security?
    Protect networks and data
  • What is the definition of malware?
    Malicious software
  • What is social engineering in network security?
    Manipulating people
  • What is the purpose of phishing attacks?
    Obtain sensitive information
  • Effective network security safeguards sensitive information and prevents data breaches.
    True
  • Malware includes viruses, worms, and trojans
  • What is the main goal of hacking in network security?
    Gain unauthorized access
  • Malware is designed to disrupt, damage, or gain unauthorized access
  • How does a worm spread across a network?
    Self-replicates independently
  • Ransomware demands payment for decrypting encrypted files.

    True
  • A virus spreads through program execution
  • Match the malware type with its description:
    Virus ↔️ Attaches to files and spreads through program execution
    Worm ↔️ Self-replicates and spreads independently
    Trojan Horse ↔️ Disguises as legitimate software
    Spyware ↔️ Collects user data without consent
    Ransomware ↔️ Encrypts files and demands payment
  • Network security aims to protect data from unauthorized access, misuse, and disruption.

    True
  • Social engineering involves manipulating people to reveal sensitive information
  • Which type of attack overwhelms a network with traffic to make it unavailable to legitimate users?
    Denial-of-Service (DoS)
  • Match the malware type with its example:
    Virus ↔️ Chernobyl virus
    Worm ↔️ WannaCry ransomware
    Trojan Horse ↔️ Zeus banking trojan
  • What is the primary goal of phishing attacks?
    Trick users into revealing data
  • An email impersonating a bank requesting account details is an example of phishing.

    True
  • Trojans are a type of malware that disguise themselves as legitimate software to trick users into installing
  • Match the feature with its corresponding category:
    Access Method ↔️ Bypasses normal security measures ||| Disguises itself as legitimate software
    Purpose ↔️ Gain remote control of the system ||| Provide backdoor access and enable further attacks
  • Network Security ensures the confidentiality, integrity, and availability of network resources and data
  • Confidentiality in network security means protecting data from unauthorized disclosure.

    True
  • What is an example of hacking?
    Exploiting software vulnerabilities
  • Social Engineering involves manipulating people into revealing sensitive information
  • What is the primary purpose of malware?
    Gain unauthorized access
  • A trojan horse disguises itself as legitimate software to trick users.

    True
  • DDoS attacks use multiple compromised systems to amplify the attack's impact
  • What is the primary goal of phishing?
    Acquire sensitive information
  • Social engineering relies on psychological manipulation and trust
  • What is the purpose of a Trojan in a cyber attack?
    Provide backdoor access
  • Trojans facilitate backdoor access, making them a significant network security threat.
    True
  • What type of vulnerability does SQL injection exploit?
    SQL queries
  • A data breach involves the unauthorized access, disclosure, or theft
  • What is an example of a data breach caused by phishing?
    Employees providing login credentials
  • Network security is crucial for maintaining system availability and preventing data breaches.

    True
  • Denial-of-Service attacks overwhelm a network with traffic
  • Threats to computer systems can compromise data confidentiality and integrity.

    True
  • Ransomware encrypts a victim's files and demands payment
  • What is the primary function of a Denial-of-Service (DoS) attack?
    Make systems unavailable
  • Social engineering involves manipulating people to compromise security.
    True