with verified answers
A type of passive attack Ans✓✓✓-In the context of IT security, wiretapping is
considered
A weakness or flaw in hardware, software, or facilities that can be taken
advantage of to compromise security Ans✓✓✓-Which of the following is the best
definition of a security Vulnerability?
An exploit Ans✓✓✓-A hacker uses a script that automatically injects SQL
commands into web forms to steal data from a database. This script is an example
of:
ARP Poisoning Ans✓✓✓-What type of attack involves modifying network tables
to associate the attacker's MAC address with the IP address of a legitimate user?
Availability Ans✓✓✓-A distributed denial of service (DDoS) attack overwhelms a
popular e-commerce website, causing it to crash. Which element of the CIA Triad
is directly impacted?
Availability Ans✓✓✓-A healthcare provider's patient portal becomes inaccessible
due to a misconfigured firewall that blocks incoming patient traffic. This scenario
primarily compromises which principle of the CIA triad?
Availability Ans✓✓✓-During a network upgrade, an administrator mistakenly
cuts off the backup data center from the main network. This error leaves the
organization without a failover option in case of a primary data center failure.
What aspect of the CIA triad has been compromised?
, Black Hat Hacker Ans✓✓✓-Someone who breaks into digital systems with the
intention of creating and spreading malware for financial gain would be
considered a:
Brute Force Attack Ans✓✓✓-In cybersecurity, what type of attack involves
systematically trying all possible combinations of letters, numbers, and special
characters to compromise a password
Card key access system to the server room Ans✓✓✓-An organization wants to
ensure that only authorized personnel can access the server room. Which of the
following is the most effective solution?
Confidentiality Ans✓✓✓-An attacker uses a zero-day exploit to install spyware on
a corporate network, allowing them to monitor all internal communications. This
attack compromises which principle of the CIA triad?
Confidentiality Ans✓✓✓-An employee at a financial institution accidentally
emails a spreadsheet containing sensitive customer information to the wrong
recipient. Which aspect of the CIA Triad is compromised in this scenario?
Confidentiality Ans✓✓✓-An employee loses a laptop containing unencrypted
personal data of clients. Which principle of the CIA triad is primarily
compromised?
External Threat Ans✓✓✓-An attacker is trying to infiltrate the network from an
offsite location. What type of threat does this attacker represent?