100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Cybersecurity Course 1 Module 2 Questions

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
07-01-2026
Escrito en
2025/2026

What type of ma- nipulation tech- nique was the LoveLetter at- tack? The Love Letter attack was an example of social engineering. Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. 2. What are the 5 most common phishing attacks

Mostrar más Leer menos
Institución
Cybersecurity Course 1 Module 2
Grado
Cybersecurity Course 1 Module 2









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Cybersecurity Course 1 Module 2
Grado
Cybersecurity Course 1 Module 2

Información del documento

Subido en
7 de enero de 2026
Número de páginas
7
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Cybersecurity Course 1 Module 2 Questions
Study online at https://quizlet.com/_e06e1h

1. What type of ma- The Love Letter attack was an example of social engineering. Social engineering
nipulation tech- is a manipulation technique that exploits human error to gain private information,
nique was the access, or valuables.
LoveLetter at-
tack?

2. What are the Business Email Compromise (BEC)
5 most common Spear phishing
phishing attacks Whaling
Vishing
Smishing

3. What are the Viruses
5 most common Worms
Malware attacks Ransomware
Spyware

4. What are the Social media Phishing
5 most common Watering hole attack
Social engineer- USB baiting
ing attacks Physical Social engineering

5. Why are social Authority: Threat actors impersonate individuals with power. This is because peo-
engineering at- ple, in general, have been conditioned to respect and follow authority figures.
tacks so effective Intimidation: Threat actors use bullying tactics. This includes persuading and
intimidating victims into doing what they're told.
Consensus/Social proof: Because people sometimes do things that they believe
many others are doing, threat actors use others' trust to pretend they are legiti-
mate. For example, a threat actor might try to gain access to private data by telling
an employee that other people at the company have given them access to that data
in the past.
Scarcity: A tactic used to imply that goods or services are in limited supply.

1/7

, Cybersecurity Course 1 Module 2 Questions
Study online at https://quizlet.com/_e06e1h

Familiarity: Threat actors establish a fake emotional connection with users that can
be exploited.
Trust: Threat actors establish an emotional relationship with users that can be
exploited over time. They use this relationship to develop trust and gain personal
information.
Urgency: A thr

6. A computer virus code
is malicious _____
that interferes
with computer
operations and
causes damage.

7. What is one way The Morris worm helped shape the security industry because it led to the devel-
that the Mor- opment of computer emergency response teams, now commonly referred to as
ris worm helped computer security incident response teams (CSIRTs).
shape the securi-
ty industry?

8. What were the The key impacts of the Equifax breach were the fact that millions of customers' PII
key impacts was stolen and that the significant financial consequences of a breach became
of the Equifax more apparent.
breach?

9. Social engineer- False; relies on user error
ing, such as
phishing, is a ma-
nipulation tech-
nique that relies
on computer er-
ror to gain pri-
vate information,
2/7
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
learndirect Liberty University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
45
Miembro desde
1 año
Número de seguidores
10
Documentos
3339
Última venta
1 mes hace
Learndirect

Here You will All Documents, and Package Deal Offered By Seller Learndirect.

3.3

6 reseñas

5
3
4
0
3
1
2
0
1
2

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes