Cyber security test
An attacker is sitting in front of a store and wireless copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?
Bluesnarfing
What occurs on a computer when data goes beyond the limits of a buffer?
A buffer overflow
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
A type of ransomware
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
Algorithm
What is the name given to a program or program code that bypasses normal authentication?
Backdoor
A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?
Spyware
What does a rootkit modify?
Operating system
What type of attack targets an SQL database using the input field of a user?
SQL injection
What name is given to a amateur hacker?
Script kiddie
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Analyze
What name is given to hackers who hack for a cause?
Hactivist
What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?
Cross-site scripting
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
DDoS
What does the acronym IoE represent?
Internet of Everything
What is an example of an Internet data domain?
What is the meaning of the term logic bomb?
a malicious program that hides itself in a legitimate program
What is the name for the type of software that generates revenue by generating annoying pop-ups?
adware
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
phishing
What is the term used to describe an email that is targeting a specific person employed at a financial institution?
spear phishing
What is the difference between a virus and a worm?
worms self replicate and viruses dont