100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS

Puntuación
-
Vendido
-
Páginas
19
Grado
A+
Subido en
10-11-2025
Escrito en
2025/2026

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS

Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
10 de noviembre de 2025
Número de páginas
19
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS #6
Virus - correct answer A piece of code that is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data


Social Engineering - correct answer Tricking/Deceiving Someone into giving you private
information or data


Backdoor - correct answer Attacker gets access by using an exploit to access the system


Spyware - correct answer software that obtains information about another computer's
activities without knowledge of the user


Spear Phishing Attack - correct answer is an email or electronic communications scam targeted
towards a specific individual, organization or business. Although often intended to steal data for
malicious purposes, cybercriminals may also intend to install malware on a targeted user's
computer.


DOS - correct answer Denial of Service: an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.


DDOS - correct answer Distributed Denial of Service: occurs when multiple systems flood the
bandwidth or resources of a targeted system, usually one or more web servers. Such an attack
is often the result of multiple compromised systems (for example, a botnet) flooding the
targeted system with traffic.


Botnet - correct answer a network of private computers infected with malicious software and
controlled as a group without the owners' knowledge, used to send spam messages, ddos
attacks, mine for cryptocurrency, and more


Dumpster Diving - correct answer looking through trash to obtain sensitive information

,Ransomware - correct answer malicious software that blocks access to computer until an
amount of money is paid


Malware - correct answer software intended to harm computers, networks, people, or
businesses


Drive-by Download - correct answer Downloads installed by just passing through an infected
webpage


E-mail flooding - correct answer sending many emails to a target to flood the inbox and take
down the server


Trojan Horse - correct answer a virus disguised as real software, to make it appear harmless so
victims download and run it


Worm - correct answer a self-replicating virus that does not usually alter files but resides in
active memory and duplicates itself. Worms use parts of an operating system that are
automatic and usually invisible to the user. It is common for worms to be noticed only when
their uncontrolled replication consumes system resources, slowing or halting other tasks.


DNS spoofing - correct answer also referred to as DNS cache poisoning, is a form of computer
hacking in which corrupt Domain Name System data is introduced into a DNS resolver's cache,
causing the name server to return an incorrect IP address, which results in diverting traffic to
the attacker's computer (or any other computer).


Scareware - correct answer Malware which tricks users into buying fake antivirus protection


White Hat - correct answer A hacker who does good. Tests security systems with consent of the
owners.

, Black Hat - correct answer A hacker who uses their abilities for malicious purposes such as
breaching and bypassing internet secuirty.


Cyberterrorist - correct answer Someone who uses computers to cause severe damage or
widespread fear in society.


Hacktivist - correct answer a computer hacker whose activity is aimed at promoting a social or
political cause.


Cyberespionage - correct answer the use of computer networks to gain illicit access to
confidential information, typically that held by a government or other organization.


Bots - correct answer Bots can send spam attacks, dos attacks, and others. Malware ran on a
computer can let the attacker place these on computers which once infected are called
zombies.
A collection of bots all controlled by one person is called a botnet, commonly used for DDOS
attacks


Password Cracker - correct answer a program used to guess a users password, using lists of
keywords and common passwords.


Adware - correct answer Malware that displays ads when the user is on the internet, and can
collect marketing data without the user's knowledge. Adware can also redirect a search
request.


Sniffing - correct answer allows individuals to capture data as it is transmitted over a network
and is used by network professionals to diagnose network issues, and by malicious users to
capture unencrypted data, like passwords and usernames.


Script Kiddie - correct answer a person who uses existing computer scripts or code to hack into
computers, lacking the expertise to write their own.
$14.71
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
simonnjaramba

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
simonnjaramba Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
Nuevo en Stuvia
Miembro desde
1 mes
Número de seguidores
0
Documentos
112
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes