100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
10-11-2025
Written in
2025/2026

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 10, 2025
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS #6
Virus - correct answer A piece of code that is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data


Social Engineering - correct answer Tricking/Deceiving Someone into giving you private
information or data


Backdoor - correct answer Attacker gets access by using an exploit to access the system


Spyware - correct answer software that obtains information about another computer's
activities without knowledge of the user


Spear Phishing Attack - correct answer is an email or electronic communications scam targeted
towards a specific individual, organization or business. Although often intended to steal data for
malicious purposes, cybercriminals may also intend to install malware on a targeted user's
computer.


DOS - correct answer Denial of Service: an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.


DDOS - correct answer Distributed Denial of Service: occurs when multiple systems flood the
bandwidth or resources of a targeted system, usually one or more web servers. Such an attack
is often the result of multiple compromised systems (for example, a botnet) flooding the
targeted system with traffic.


Botnet - correct answer a network of private computers infected with malicious software and
controlled as a group without the owners' knowledge, used to send spam messages, ddos
attacks, mine for cryptocurrency, and more


Dumpster Diving - correct answer looking through trash to obtain sensitive information

,Ransomware - correct answer malicious software that blocks access to computer until an
amount of money is paid


Malware - correct answer software intended to harm computers, networks, people, or
businesses


Drive-by Download - correct answer Downloads installed by just passing through an infected
webpage


E-mail flooding - correct answer sending many emails to a target to flood the inbox and take
down the server


Trojan Horse - correct answer a virus disguised as real software, to make it appear harmless so
victims download and run it


Worm - correct answer a self-replicating virus that does not usually alter files but resides in
active memory and duplicates itself. Worms use parts of an operating system that are
automatic and usually invisible to the user. It is common for worms to be noticed only when
their uncontrolled replication consumes system resources, slowing or halting other tasks.


DNS spoofing - correct answer also referred to as DNS cache poisoning, is a form of computer
hacking in which corrupt Domain Name System data is introduced into a DNS resolver's cache,
causing the name server to return an incorrect IP address, which results in diverting traffic to
the attacker's computer (or any other computer).


Scareware - correct answer Malware which tricks users into buying fake antivirus protection


White Hat - correct answer A hacker who does good. Tests security systems with consent of the
owners.

, Black Hat - correct answer A hacker who uses their abilities for malicious purposes such as
breaching and bypassing internet secuirty.


Cyberterrorist - correct answer Someone who uses computers to cause severe damage or
widespread fear in society.


Hacktivist - correct answer a computer hacker whose activity is aimed at promoting a social or
political cause.


Cyberespionage - correct answer the use of computer networks to gain illicit access to
confidential information, typically that held by a government or other organization.


Bots - correct answer Bots can send spam attacks, dos attacks, and others. Malware ran on a
computer can let the attacker place these on computers which once infected are called
zombies.
A collection of bots all controlled by one person is called a botnet, commonly used for DDOS
attacks


Password Cracker - correct answer a program used to guess a users password, using lists of
keywords and common passwords.


Adware - correct answer Malware that displays ads when the user is on the internet, and can
collect marketing data without the user's knowledge. Adware can also redirect a search
request.


Sniffing - correct answer allows individuals to capture data as it is transmitted over a network
and is used by network professionals to diagnose network issues, and by malicious users to
capture unencrypted data, like passwords and usernames.


Script Kiddie - correct answer a person who uses existing computer scripts or code to hack into
computers, lacking the expertise to write their own.
$14.70
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
simonnjaramba

Also available in package deal

Thumbnail
Package deal
CYBER SECURITY REVISED QUESTIONS WITH CERTIFIED ANSWERS
-
16 2025
$ 168.56 More info

Get to know the seller

Seller avatar
simonnjaramba Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
1 month
Number of followers
0
Documents
112
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions