Understanding Security Threats – Shuffle Q/A 1

30. What kind of malware can block access to data and decrease the availability of security by holding the system hostage?

  • Spyware
  • A logic bomb
  • Ransomware
  • Adware

31. What is it called when a hacker gets into a system through a secret entryway to gain remote access to the computer?

  • Ransomware
  • A backdoor
  • Adware
  • A Trojan

32. Which of the following best helps you strengthen your password?

  • Use passwords from a precompiled list
  • Incorporate symbols, numbers, and capital letters
  • Choose the name of a favorite movie as a password
  • Use the name of a beloved pet as a password

33. An attacker leaves a flash drive loaded with malware on a table. Someone plugs the drive into their computer to see what’s on it and accidentally installs malware. What kind of attack is this?

  • Baiting
  • DDoS
  • Phishing
  • Tailgating

34. What's the difference between a virus and a worm?

  • Worms replicate through files, but viruses live on their own.
  • Viruses do not replicate, but worms do.
  • Worms replicate, but viruses do not.
  • Viruses replicate through files, but worms live on their own.

35. An employee at a company plugs a router into the corporate network to make a simple wireless network. An attacker outside the building uses it to get access to the corporate network. What is the name of this type of attack?

  • SYN flood attack
  • A rogue AP (Access Point) attack
  • A Denial-of-Service (DoS) attack
  • A DNS cache poisoning attack

36. Which of the following can occur during a ping of death (POD) attack? Select all that apply.

  • Phishing
  • Baiting
  • A buffer overflow
  • Execution of malicious code

37. What is it called when a hacker takes down multiple services very quickly with the help of botnets?

  • Distributed denial-of-service (DDoS)
  • Cross-site Scripting (XSS)
  • A SQL injection
  • A password attack

38. If a hacker targets a vulnerable website by running commands that delete the website's data in its database, what type of attack did the hacker perform?

  • Cross-site Scripting (XSS)
  • SQL injection
  • A dictionary attack
  • A Denial-of-Service (DoS) attack

39. Fill in the blank: Phishing, spoofing, and tailgating are examples of ________ attacks.

  • Network
  • Social engineering
  • Malware
  • Injection

Shuffle Q/A 2

40. In the terminology of information security, what is a vulnerability?

  • The possibility of suffering a loss in the event of an attack
  • A program that entices users to download it, then installs malware on their systems
  • A piece of malware that records each keypress by the user and gathers confidential information
  • A flaw in the code of an application that can be exploited

41. What is a tool that protects passwords by checking whether the input is coming from a machine or a human?

  • A firewall
  • A key logger
  • Antimalware software

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply