CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS #6
Virus - correct answer A piece of code that is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data
Social Engineering - correct answer Tricking/Deceiving Someone into giving you private
information or data
Backdoor - correct answer Attacker gets access by using an exploit to access the system
Spyware - correct answer software that obtains information about another computer's
activities without knowledge of the user
Spear Phishing Attack - correct answer is an email or electronic communications scam targeted
towards a specific individual, organization or business. Although often intended to steal data for
malicious purposes, cybercriminals may also intend to install malware on a targeted user's
computer.
DOS - correct answer Denial of Service: an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.
DDOS - correct answer Distributed Denial of Service: occurs when multiple systems flood the
bandwidth or resources of a targeted system, usually one or more web servers. Such an attack
is often the result of multiple compromised systems (for example, a botnet) flooding the
targeted system with traffic.
Botnet - correct answer a network of private computers infected with malicious software and
controlled as a group without the owners' knowledge, used to send spam messages, ddos
attacks, mine for cryptocurrency, and more
Dumpster Diving - correct answer looking through trash to obtain sensitive information
,Ransomware - correct answer malicious software that blocks access to computer until an
amount of money is paid
Malware - correct answer software intended to harm computers, networks, people, or
businesses
Drive-by Download - correct answer Downloads installed by just passing through an infected
webpage
E-mail flooding - correct answer sending many emails to a target to flood the inbox and take
down the server
Trojan Horse - correct answer a virus disguised as real software, to make it appear harmless so
victims download and run it
Worm - correct answer a self-replicating virus that does not usually alter files but resides in
active memory and duplicates itself. Worms use parts of an operating system that are
automatic and usually invisible to the user. It is common for worms to be noticed only when
their uncontrolled replication consumes system resources, slowing or halting other tasks.
DNS spoofing - correct answer also referred to as DNS cache poisoning, is a form of computer
hacking in which corrupt Domain Name System data is introduced into a DNS resolver's cache,
causing the name server to return an incorrect IP address, which results in diverting traffic to
the attacker's computer (or any other computer).
Scareware - correct answer Malware which tricks users into buying fake antivirus protection
White Hat - correct answer A hacker who does good. Tests security systems with consent of the
owners.
, Black Hat - correct answer A hacker who uses their abilities for malicious purposes such as
breaching and bypassing internet secuirty.
Cyberterrorist - correct answer Someone who uses computers to cause severe damage or
widespread fear in society.
Hacktivist - correct answer a computer hacker whose activity is aimed at promoting a social or
political cause.
Cyberespionage - correct answer the use of computer networks to gain illicit access to
confidential information, typically that held by a government or other organization.
Bots - correct answer Bots can send spam attacks, dos attacks, and others. Malware ran on a
computer can let the attacker place these on computers which once infected are called
zombies.
A collection of bots all controlled by one person is called a botnet, commonly used for DDOS
attacks
Password Cracker - correct answer a program used to guess a users password, using lists of
keywords and common passwords.
Adware - correct answer Malware that displays ads when the user is on the internet, and can
collect marketing data without the user's knowledge. Adware can also redirect a search
request.
Sniffing - correct answer allows individuals to capture data as it is transmitted over a network
and is used by network professionals to diagnose network issues, and by malicious users to
capture unencrypted data, like passwords and usernames.
Script Kiddie - correct answer a person who uses existing computer scripts or code to hack into
computers, lacking the expertise to write their own.
Virus - correct answer A piece of code that is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data
Social Engineering - correct answer Tricking/Deceiving Someone into giving you private
information or data
Backdoor - correct answer Attacker gets access by using an exploit to access the system
Spyware - correct answer software that obtains information about another computer's
activities without knowledge of the user
Spear Phishing Attack - correct answer is an email or electronic communications scam targeted
towards a specific individual, organization or business. Although often intended to steal data for
malicious purposes, cybercriminals may also intend to install malware on a targeted user's
computer.
DOS - correct answer Denial of Service: an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.
DDOS - correct answer Distributed Denial of Service: occurs when multiple systems flood the
bandwidth or resources of a targeted system, usually one or more web servers. Such an attack
is often the result of multiple compromised systems (for example, a botnet) flooding the
targeted system with traffic.
Botnet - correct answer a network of private computers infected with malicious software and
controlled as a group without the owners' knowledge, used to send spam messages, ddos
attacks, mine for cryptocurrency, and more
Dumpster Diving - correct answer looking through trash to obtain sensitive information
,Ransomware - correct answer malicious software that blocks access to computer until an
amount of money is paid
Malware - correct answer software intended to harm computers, networks, people, or
businesses
Drive-by Download - correct answer Downloads installed by just passing through an infected
webpage
E-mail flooding - correct answer sending many emails to a target to flood the inbox and take
down the server
Trojan Horse - correct answer a virus disguised as real software, to make it appear harmless so
victims download and run it
Worm - correct answer a self-replicating virus that does not usually alter files but resides in
active memory and duplicates itself. Worms use parts of an operating system that are
automatic and usually invisible to the user. It is common for worms to be noticed only when
their uncontrolled replication consumes system resources, slowing or halting other tasks.
DNS spoofing - correct answer also referred to as DNS cache poisoning, is a form of computer
hacking in which corrupt Domain Name System data is introduced into a DNS resolver's cache,
causing the name server to return an incorrect IP address, which results in diverting traffic to
the attacker's computer (or any other computer).
Scareware - correct answer Malware which tricks users into buying fake antivirus protection
White Hat - correct answer A hacker who does good. Tests security systems with consent of the
owners.
, Black Hat - correct answer A hacker who uses their abilities for malicious purposes such as
breaching and bypassing internet secuirty.
Cyberterrorist - correct answer Someone who uses computers to cause severe damage or
widespread fear in society.
Hacktivist - correct answer a computer hacker whose activity is aimed at promoting a social or
political cause.
Cyberespionage - correct answer the use of computer networks to gain illicit access to
confidential information, typically that held by a government or other organization.
Bots - correct answer Bots can send spam attacks, dos attacks, and others. Malware ran on a
computer can let the attacker place these on computers which once infected are called
zombies.
A collection of bots all controlled by one person is called a botnet, commonly used for DDOS
attacks
Password Cracker - correct answer a program used to guess a users password, using lists of
keywords and common passwords.
Adware - correct answer Malware that displays ads when the user is on the internet, and can
collect marketing data without the user's knowledge. Adware can also redirect a search
request.
Sniffing - correct answer allows individuals to capture data as it is transmitted over a network
and is used by network professionals to diagnose network issues, and by malicious users to
capture unencrypted data, like passwords and usernames.
Script Kiddie - correct answer a person who uses existing computer scripts or code to hack into
computers, lacking the expertise to write their own.