Understanding forms of attack

Cards (33)

  • A security threat could compromise the confidentiality, integrity, or availability
  • Understanding different threat types is crucial for implementing security measures.

    True
  • A DDoS attack is a type of DoS attack.
  • A denial of service (DoS) attack aims to overwhelm a system with traffic.

    True
  • Malware is malicious software designed to disrupt or cause damage
  • What is the primary purpose of malware?
    Disrupt or damage systems
  • What does DoS stand for in cybersecurity?
    Denial of Service
  • What are the two key elements of a security threat?
    Vulnerability and attack
  • Social engineering relies on exploiting human psychology to compromise security
    True
  • An attack is an attempt to exploit vulnerabilities to cause harm or unauthorized access
  • Phishing is a common example of social engineering.
    True
  • Brute-force attacks and SQL injection are examples of hacking
  • A DDoS attack is a type of denial of service attack.
    True
  • Malware is a specific type of malicious software intended to disrupt, damage, or gain unauthorized access
  • Social engineering relies on technical vulnerabilities to gain access to systems
    False
  • Malware is a specific type of malicious software intended to disrupt or damage systems

    True
  • What is the primary goal of hacking in cybersecurity?
    Gain unauthorized access
  • Match the network attack type with its description:
    Malware ↔️ Malicious software designed to disrupt or damage a system
    Hacking ↔️ Gaining unauthorized access to a system
    Social Engineering ↔️ Manipulating individuals to divulge sensitive information
    DoS ↔️ Overwhelming a system to make it unavailable
    Physical Threats ↔️ Damage or theft of physical computer equipment
  • A security vulnerability is a weakness in a system's design, implementation, or configuration
  • Baiting involves leaving a malware-infected device in a public place to entice someone to use it

    True
  • Vulnerability refers to a weakness or flaw in a system's design, implementation, or configuration.

    True
  • Brute-force attacks and SQL injection are examples of hacking
  • A vulnerability is a weakness or flaw in a system's design.
    True
  • Phishing, pretexting, and baiting are examples of social engineering attacks.
  • A denial of service (DoS) attack overwhelms a system to make it unavailable.

    True
  • Hacking involves unauthorized access to system data or resources
  • Physical threats include damage or theft of physical equipment
  • Examples of malware include viruses, worms, Trojans, and ransomware
  • What does a Denial of Service (DoS) attack aim to achieve?
    Make a system unavailable
  • Laptop theft is considered a physical threat in cybersecurity
    True
  • What is the goal of pretexting in social engineering attacks?
    Create a plausible scenario
  • What is an example of a DoS attack?
    DDoS attack
  • Match the vulnerability type with its example:
    Software Bugs ↔️ Buffer overflows
    Configuration Errors ↔️ Default passwords
    Design Flaws ↔️ Lack of encryption
    Hardware Vulnerabilities ↔️ Faulty memory chips