100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity Course 1 Module 2 Questions

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
07-01-2026
Written in
2025/2026

What type of ma- nipulation tech- nique was the LoveLetter at- tack? The Love Letter attack was an example of social engineering. Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. 2. What are the 5 most common phishing attacks

Show more Read less
Institution
Cybersecurity Course 1 Module 2
Course
Cybersecurity Course 1 Module 2









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity Course 1 Module 2
Course
Cybersecurity Course 1 Module 2

Document information

Uploaded on
January 7, 2026
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cybersecurity Course 1 Module 2 Questions
Study online at https://quizlet.com/_e06e1h

1. What type of ma- The Love Letter attack was an example of social engineering. Social engineering
nipulation tech- is a manipulation technique that exploits human error to gain private information,
nique was the access, or valuables.
LoveLetter at-
tack?

2. What are the Business Email Compromise (BEC)
5 most common Spear phishing
phishing attacks Whaling
Vishing
Smishing

3. What are the Viruses
5 most common Worms
Malware attacks Ransomware
Spyware

4. What are the Social media Phishing
5 most common Watering hole attack
Social engineer- USB baiting
ing attacks Physical Social engineering

5. Why are social Authority: Threat actors impersonate individuals with power. This is because peo-
engineering at- ple, in general, have been conditioned to respect and follow authority figures.
tacks so effective Intimidation: Threat actors use bullying tactics. This includes persuading and
intimidating victims into doing what they're told.
Consensus/Social proof: Because people sometimes do things that they believe
many others are doing, threat actors use others' trust to pretend they are legiti-
mate. For example, a threat actor might try to gain access to private data by telling
an employee that other people at the company have given them access to that data
in the past.
Scarcity: A tactic used to imply that goods or services are in limited supply.

1/7

, Cybersecurity Course 1 Module 2 Questions
Study online at https://quizlet.com/_e06e1h

Familiarity: Threat actors establish a fake emotional connection with users that can
be exploited.
Trust: Threat actors establish an emotional relationship with users that can be
exploited over time. They use this relationship to develop trust and gain personal
information.
Urgency: A thr

6. A computer virus code
is malicious _____
that interferes
with computer
operations and
causes damage.

7. What is one way The Morris worm helped shape the security industry because it led to the devel-
that the Mor- opment of computer emergency response teams, now commonly referred to as
ris worm helped computer security incident response teams (CSIRTs).
shape the securi-
ty industry?

8. What were the The key impacts of the Equifax breach were the fact that millions of customers' PII
key impacts was stolen and that the significant financial consequences of a breach became
of the Equifax more apparent.
breach?

9. Social engineer- False; relies on user error
ing, such as
phishing, is a ma-
nipulation tech-
nique that relies
on computer er-
ror to gain pri-
vate information,
2/7

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
learndirect Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
45
Member since
1 year
Number of followers
10
Documents
3339
Last sold
1 month ago
Learndirect

Here You will All Documents, and Package Deal Offered By Seller Learndirect.

3.3

6 reviews

5
3
4
0
3
1
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions