Cyber security Exam Questions with 100% Correct Answers
Security vulnerability Correct Answer A weakness in a system component that could be exploited to allow unauthorized access or cause service disruptions. An exploit Correct Answer a program written to take advantage of a known security vulnerability Cyber attack Correct Answer an attempt by hackers to damage or destroy a computer network or system. Botnet Correct Answer a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages. Blended attack Correct Answer A blended threat (also known as a blended attack) is a software exploit which in turn involves a combination of attacks against different vulnerabilities. For example, many worm, a trojan horse and a computer virus exploit multiple techniques to attack and propagate. White hat hacker Correct Answer white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Black hat hacker Correct Answer A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". ... Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users. Gray hat hacker Correct Answer The term "grey hat", alternatively spelled as "greyhat" or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. Malware Correct Answer software that is intended to damage or disable computers and computer systems Spyware Correct Answer software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Adware Correct Answer software that automatically displays or downloads advertising material (often unwanted) when a user is online.
Written for
- Institution
- Cyber Security Specialist
- Course
- Cyber Security Specialist
Document information
- Uploaded on
- August 13, 2023
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal