Within cyber security a weakness that can compromise a system is known as a _______.
CORRECT ANSWER-Vulnerability
What does social engineering attacks utilize to compromise a network? CORRECT
ANSWER-The individual / end user
Which type of attack occurs when an attacker inserts himself in the middle of two systems that
are communicating to view or disrupt sensitive information? CORRECT ANSWER-Man-in-
the-middle attack
Which type of attack uses multiple systems to attack a single target system with the intent to
crash the system or prevent it from fulfilling its purpose? CORRECT ANSWER-Distributed
denial of service (DDoS) attack
Which type of virus is self-replicating, infecting a computer system by spreading across the
network? CORRECT ANSWER-Worm virus
What type of malware is used to monitor and collect information from a system?
CORRECT ANSWER-Spyware
What type of malware takes control of a system by encrypting it until a fee is paid for the
encryption key? CORRECT ANSWER-Ransomware