Cyber security test

¡Supera tus tareas y exámenes ahora con Quizwiz!

An attacker is sitting in front of a store and wireless copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?

Bluesnarfing

What occurs on a computer when data goes beyond the limits of a buffer?

A buffer overflow

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

A type of ransomware

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

Algorithm

What is the name given to a program or program code that bypasses normal authentication?

Backdoor

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

Spyware

What does a rootkit modify?

Operating system

What type of attack targets an SQL database using the input field of a user?

SQL injection

What name is given to a amateur hacker?

Script kiddie

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Analyze

What name is given to hackers who hack for a cause?

Hactivist

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

Cross-site scripting

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DDoS

What does the acronym IoE represent?

Internet of Everything

What is an example of an Internet data domain?

Linkedin

What is the meaning of the term logic bomb?

a malicious program that hides itself in a legitimate program

What is the name for the type of software that generates revenue by generating annoying pop-ups?

adware

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

phishing

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

spear phishing

What is the difference between a virus and a worm?

worms self replicate and viruses dont


Conjuntos de estudio relacionados

Real Estate Continuing Education Practice Questions 45 hours

View Set

American Federal Government Final Exam

View Set

Artificial Intelligence and Neurocognition Review

View Set

Comprehensive NCLEX Review-mental health

View Set

Chapter 43: Nursing Management: Lower Gastrointestinal Problems, ch.44 liver, pancreas, and biliary tract problems, MedSurg Ch. 61, Lewis Ch. 44, Chapter 43: Nursing Management: Lower Gastrointestinal Problems practice questions, Chapter 59 Chronic N...

View Set

Busc-1B Microeconomics final study guide

View Set