CS G8 TEST 1

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:33 AM on 9/17/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

What is the purpose of a DoS attack?

To make a network resource unavailable to its intended users.

2
New cards

What is the goal of a phishing attack?

To trick victims into revealing valuable data by disguising a message as coming from a reputable source.

3
New cards

What is the purpose of penetration testers?

To legally test systems for weaknesses.

4
New cards

A trojan is software that appears to perform a useful function but secretly executes malicious actions.

True

5
New cards

In simpler terms, what does the Data protection Act 2018 ensure regarding the use of personal data?

Personal data is used fairly, transparently and only for legitimate purposes.

6
New cards

Malware is designed to improve computer performance?

False.

7
New cards

What is the purpose of social engineering?

to deceive individuals into handling over information for fraudulent purposes.

8
New cards

Which statement best describes the difference between ethical hacking and unethical hacking?

Ethical hacking is authorized testing to identify vulnerabilities.

9
New cards

A firewall blocks all internet access

false.

10
New cards

Anti - malware software guarantees complete protection against all threats?

false.

11
New cards

A DoS attack’s purpose is to overwhelm a network or system with traffic, making it unavailable to legitimate users.

True.

12
New cards

Spyware is designed to monitor and gather information about a person and how they use their computer.

true.

13
New cards

Which description best defines a phishing attack?

tricking people into revealing sensitive data by posing as a trusted sender.

14
New cards

what is the main goal of a bagging attack?

to manipulate someone into revealing confidential information or money.

15
New cards

What is data?

Data is raw facts and figures.

16
New cards

What is social engineering?

tricks used by cybercriminals to steal personal information for scams.

17
New cards

What is shouldering/ shoulder surfing?

an attack designed to steal a victim’s password or other sensitive data.

18
New cards

What is bagging/pretexting

a fake story used to trick someone into giving information or money.

19
New cards

What is the difference between phishing and blagging?

phishing uses fake messages to steal and blagging uses stories to trick.

Explore top flashcards

cogni finals
Updated 748d ago
flashcards Flashcards (178)
CMN E1-Obesity
Updated 239d ago
flashcards Flashcards (33)
ATRN - EXAM 2
Updated 712d ago
flashcards Flashcards (46)
HANDOUT 24.7.24
Updated 547d ago
flashcards Flashcards (93)
English vocab 2
Updated 172d ago
flashcards Flashcards (25)
cogni finals
Updated 748d ago
flashcards Flashcards (178)
CMN E1-Obesity
Updated 239d ago
flashcards Flashcards (33)
ATRN - EXAM 2
Updated 712d ago
flashcards Flashcards (46)
HANDOUT 24.7.24
Updated 547d ago
flashcards Flashcards (93)
English vocab 2
Updated 172d ago
flashcards Flashcards (25)