Cybersecurity Essentials – Unit 2 Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/129

flashcard set

Earn XP

Description and Tags

130 question-and-answer flashcards covering major concepts from Cybersecurity Essentials Unit 2: motives and targets of cyber-attacks, breach detection, common attack types, malware, attack vectors, social engineering, wireless attacks, web vulnerabilities, and key defensive tools and controls.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

130 Terms

1
New cards

What is the primary objective of a cyber-attack?

To steal, alter or destroy information.

2
New cards

Cyber-attacks are generally aimed at what goal?

Accessing or manipulating confidential data.

3
New cards

Which of the following is NOT a motivation for cyber-attacks?

Legal enforcement.

4
New cards

Hacktivism is driven by what motive?

Political or social causes.

5
New cards

Which sector is most frequently targeted in cyber-attacks?

Financial Services.

6
New cards

Define cyber-espionage.

Unauthorized spying to obtain secret information.

7
New cards

What does the acronym APT stand for?

Advanced Persistent Threat.

8
New cards

Give one well-known example of a state-sponsored cyber-attack.

Stuxnet.

9
New cards

What is the primary reason for the recent increase in cyber-attacks?

Rapid digital transformation.

10
New cards

Which of the following is considered a passive cyber threat?

Eavesdropping.

11
New cards

Cyber-warfare is primarily targeted at what?

Government or critical infrastructure.

12
New cards

What is meant by a Zero-Day attack?

An attack that occurs before a vulnerability is patched.

13
New cards

Botnets are typically used for what purpose?

Coordinated attacks such as DDoS.

14
New cards

Altering data without authorization is classified as which type of attack?

Modification attack.

15
New cards

What is a script kiddie?

An attacker who exploits known software bugs for malicious gain.

16
New cards

How is a security breach best defined?

Unauthorized access to protected data.

17
New cards

What is a common result of a data breach?

Loss of sensitive data.

18
New cards

Name one common cause of a security breach.

Weak authentication mechanisms.

19
New cards

Which technique prevents unauthorized access to data?

Encryption.

20
New cards

Give an example of a physical security breach.

Theft of a laptop.

21
New cards

How can phishing lead to a security breach?

By tricking users into revealing credentials.

22
New cards

What is the first step in breach detection?

Monitoring system logs.

23
New cards

A brute-force attack typically results in what?

Password compromise.

24
New cards

What is Snort primarily used for?

Detecting security breaches as a network intrusion detection system.

25
New cards

What is the main function of SIEM tools?

Real-time monitoring and correlation of security events.

26
New cards

Which regulation requires organizations to notify authorities of a data breach?

GDPR.

27
New cards

What is the most secure method to prevent security breaches?

Strong authentication and access control.

28
New cards

Using default passwords in systems can result in what?

Security breaches.

29
New cards

A ransomware attack is classified as what?

A type of security breach.

30
New cards

Which attack overwhelms a system with traffic to disrupt service?

Denial-of-Service (DoS) attack.

31
New cards

How does a DDoS attack differ from a DoS attack?

DDoS involves multiple systems flooding the target.

32
New cards

Capturing passwords by watching keystrokes is called what?

Keylogging.

33
New cards

What is the primary purpose of a phishing attack?

To trick users into revealing sensitive information.

34
New cards

Which attack exploits vulnerabilities in SQL databases?

SQL Injection.

35
New cards

Man-in-the-Middle (MITM) attacks involve what action?

Intercepting communication between two parties.

36
New cards

Which attack uses a false identity to trick a system or user?

Spoofing.

37
New cards

Brute-force attacks rely on what basic method?

Trying many combinations of passwords.

38
New cards

What does a replay attack involve?

Resending intercepted data to a system.

39
New cards

Give one example of an insider threat.

A disgruntled employee leaking data.

40
New cards

Cross-Site Scripting (XSS) is often used to accomplish what?

Steal cookies or session information from users.

41
New cards

Which attack specifically targets the authentication process?

Credential stuffing.

42
New cards

What is the goal of DNS spoofing?

Modifying DNS responses to redirect users.

43
New cards

A watering-hole attack targets what?

Commonly visited websites of a specific group.

44
New cards

Drive-by download attacks occur when what happens?

Malware is downloaded without the user’s consent.

45
New cards

Session hijacking refers to what activity?

Taking over a valid user session.

46
New cards

ARP spoofing targets what part of a network?

MAC address resolution in a local network.

47
New cards

In a Smurf attack, which protocols are misused?

ICMP and IP broadcasting.

48
New cards

Which malware disguises itself as a legitimate program?

Trojan Horse.

49
New cards

Which malware type can replicate itself and spread without user interaction?

Worm.

50
New cards

Which malware monitors user activity and secretly sends the data out?

Spyware.

51
New cards

Ransomware typically demands what from victims?

Financial payment.

52
New cards

How does a virus differ from a worm?

A virus requires a host file to spread, whereas a worm does not.

53
New cards

Which malware hides its existence by modifying the operating system?

Rootkit.

54
New cards

What is the primary purpose of adware?

Displaying unwanted advertisements.

55
New cards

Which malware can be controlled remotely through a C&C server?

Bot.

56
New cards

A logic bomb activates under what condition?

When a specific condition is met.

57
New cards

What is a keylogger primarily used for?

Stealing login credentials.

58
New cards

How do polymorphic viruses evade detection?

By constantly changing their code.

59
New cards

What does rogue security software do?

Pretends to fix problems but installs threats instead.

60
New cards

Where does fileless malware primarily reside?

In operating system memory.

61
New cards

Which malware modifies browser settings without permission?

Browser hijacker.

62
New cards

What is the primary function of a backdoor?

Providing secret remote access to a system.

63
New cards

A dropper is a type of malware designed to do what?

Deliver and install other malware.

64
New cards

What is a botnet?

A network of compromised machines controlled via a C&C server.

65
New cards

Define an attack vector.

A path or method used to gain unauthorized access.

66
New cards

Give an example of a software attack vector.

Insecure APIs.

67
New cards

Give an example of a human attack vector.

Social engineering.

68
New cards

Name a physical device that can serve as an attack vector.

A flash drive containing malware.

69
New cards

Which email-based attack vector is most common?

Phishing.

70
New cards

Drive-by download attack vectors are often triggered by what?

Clicking ads or visiting compromised websites.

71
New cards

Open ports and unnecessary services represent which kind of attack vector?

Network-based attack vector.

72
New cards

What does a clickjacking attack do?

Traps users into clicking hidden or disguised links.

73
New cards

Unpatched software is considered what?

A security vulnerability.

74
New cards

Leaving default credentials unchanged can be exploited as what?

An attack vector.

75
New cards

Cross-Site Request Forgery (CSRF) exploits the trust between what two entities?

A server and a user’s browser.

76
New cards

Weak authentication mechanisms are classified as what?

An attack vector.

77
New cards

Which attack vector manipulates database queries to gain access?

SQL Injection.

78
New cards

Which attack takes advantage of trust in legitimate websites frequented by a target group?

Watering-hole attack.

79
New cards

An exposed admin portal on a website is an example of what?

A vulnerable entry point.

80
New cards

Misconfigured cloud storage services are considered what type of risk?

Attack vectors.

81
New cards

The use of outdated SSL/TLS protocols is classified as what?

An attack vector.

82
New cards

Bluetooth vulnerabilities are common attack vectors in what devices?

IoT and mobile devices.

83
New cards

Packet sniffing with Wireshark allows an attacker to do what?

Intercept and analyze data packets.

84
New cards

What is the most common form of social engineering?

Phishing.

85
New cards

Social engineering attacks primarily exploit what?

Human psychology.

86
New cards

Impersonation in social engineering involves what?

Pretending to be someone trustworthy.

87
New cards

Define tailgating as a social engineering technique.

Following an authorized person into a restricted area without proper credentials.

88
New cards

Baiting attacks often involve what lure?

Promises of free items or services.

89
New cards

What does pretexting rely on?

A fabricated scenario to trick victims into giving information.

90
New cards

What is a USB drop attack?

Leaving infected USB drives for victims to plug in.

91
New cards

Phishing emails typically contain what?

Fake urgent requests for credentials or personal data.

92
New cards

What is vishing?

Voice-based phishing attacks conducted over the phone.

93
New cards

Smishing refers to social engineering through what medium?

SMS text messages.

94
New cards

What does dumpster diving involve?

Searching trash for sensitive information.

95
New cards

Shoulder surfing allows an attacker to do what?

Physically observe login credentials being entered.

96
New cards

What is the best defense against social engineering attacks?

User awareness and training.

97
New cards

How does spear phishing differ from general phishing?

Spear phishing targets specific individuals or organizations.

98
New cards

Which wireless encryption protocol is considered the weakest?

WEP.

99
New cards

Which attack targets Wi-Fi communication by capturing data packets?

Wireless packet sniffing.

100
New cards

What is a rogue access point?

An unauthorized wireless device mimicking a legitimate AP.