100% found this document useful (1 vote)
661 views6 pages

Question and Answer

This document contains multiple choice, true/false, and identification questions about cybersecurity topics such as malware, vulnerabilities, attacks, and social engineering. The questions cover spyware, Trojan horses, buffer overflows, race conditions, tailgating, ransomware, denial of service attacks, phishing, search engine optimization poisoning, man-in-the-mobile attacks, software and hardware vulnerabilities, distributed denial of service attacks, and overwhelming traffic attacks. The document is assessing understanding of common security threats and techniques.

Uploaded by

eliza marie luis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
661 views6 pages

Question and Answer

This document contains multiple choice, true/false, and identification questions about cybersecurity topics such as malware, vulnerabilities, attacks, and social engineering. The questions cover spyware, Trojan horses, buffer overflows, race conditions, tailgating, ransomware, denial of service attacks, phishing, search engine optimization poisoning, man-in-the-mobile attacks, software and hardware vulnerabilities, distributed denial of service attacks, and overwhelming traffic attacks. The document is assessing understanding of common security threats and techniques.

Uploaded by

eliza marie luis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

MULTIPLE CHOICES

1.This malware is design to track and spy on the user. often includes activity trackers, keystroke
collection, and data capture.

ANSWER: D

a. Virus

b. Worms

c. Bot

d. Spyware

2. Malicious executable code that is attached to other executable files, often legitimate programs.

ANSWER: C

a. Trojan horse

b. Man-In-The-Middle (MitM)

c. Virus

d. Spyware

3. This vulnerability occurs when data is written beyond the limits of a buffer.

ANSWER: B

a. Non-validated input

b. Buffer overflow

c. Race conditions

d. Access-control problems

4. This vulnerability is when the output of an event depends on ordered or timed outputs.

ANSWER: A

a. Race conditions

b. Buffer overflow

c. Non-validated input
d. Access-control problems

5. This is when an attacker quickly follows an authorized person into a secure location.

ANSWER: B

a. Something for Something (Quid pro quo)

b. Tailgating

c. Pretexting

6. This malware is designed to modify the operating system to create a backdoor. Attackers then use the
backdoor to access the computer remotely.

ANSWER: D

a. Trojan horse

b. Man-In-The-Middle (MitM)

c. Spyware

d. Rootkit

7. This is when an attacker requests personal information from a party in exchange for something, like a
free gift.

ANSWER: A

a. Something for Something (Quid pro quo)

b. Tailgating

c. Pretexting

8. The attacker manipulates a person who knows the password into providing it.

ANSWER: C

a. Network sniffing

b. Brute-force attacks

c. Social engineering
9. The attacker tries several possible passwords in an attempt to guess the password.

ANSWER: B

a. Network sniffing

b. Brute-force attacks

c. Social engineering

10 . This is when a maliciously formatted packet is sent to a host or application and the receiver is
unable to handle it.

ANSWER: A

a. Maliciously Formatted Packets

b. Overwhelming Quantity of Traffic

c. Network sniffing
TRUE OR FALSE

1. ________ Tailgating is when an attacker quickly follows an authorized person into a secure location.
ANSWER : TRUE
2. ________ Race conditions occurs when data is written beyond the limits of a buffer. Buffers are memory
areas allocated to an application.
ANSWER : FALSE
3. ________ are malicious code that replicate themselves by independently exploiting vulnerabilities in
networks. 
ANSWER : FALSE
4. ________ Ransomware is designed to hold a computer system or the data it contains captive
until a payment is made.
ANSWER : TRUE
5. _________ Bot is a type of malware designed to persuade the user to take a specific action based on fear.
ANSWER : FALSE
6. ________ Blended attacks are attacks that use multiple techniques to compromise a target.
ANSWER : TRUE
7. ________ Denial-of-Service (DoS)  A DoS attack results in some sort of interruption of network service to
users, devices, or applications.
ANSWER : TRUE
8. ________ DoS attacks are considered a minor risk because they cannot easily interrupt communication
and takes time to cause significant loss of time and money.
ANSWER : FALSE
9. ________ Phishing is when a malicious party sends a fraudulent email disguised as being from a
legitimate, trusted source.
ANSWER : TRUE
10. ________  a malicious user could use SEO to make a malicious website appear higher in search results.
This technique is called SEO poisoning.
ANSWER : TRUE
IDENTIFICATIONS

1. ______ type of attack used to take control over a mobile device. When infected, the mobile device can be
instructed to exfiltrate user-sensitive information and send it to the attackers.
ANSWER : Man-In-The-Mobile (MitMo)
2. ______usually introduced by errors in the operating system or application code.
ANSWER : Software vulnerabilities
3. ______ Systems and sensitive data can be protected through techniques such as authentication,
authorization, and encryption.
ANSWER : Weaknesses in security practices 
4. ______ are often introduced by hardware design flaws.
ANSWER : Hardware vulnerabilities
5. ______ This is when an attacker requests personal information from a party in exchange for something.
ANSWER : Something for Something
6. ______ The attacker manipulates a person who knows the password into providing it.
ANSWER : Social engineering
7. ______ similar to a DoS attack but originates from multiple
ANSWER : Distributed DoS Attack (DDoS)
8. _____ This is when a network, host, or application is sent an enormous quantity of data at a rate which it
cannot handle.
ANSWER : Overwhelming Quantity of Traffic
9. _____ is an access attack that attempts to manipulate individuals into performing actions or divulging
confidential information.
ANSWER : Social engineering
10. _____ are any kind of software or hardware defect
11. ANSWER : Security vulnerabilities

You might also like