Cybersecurity Flashcard

Cybersecurity Flashcard

Assessment

Flashcard

Created by

Quizizz Content

Computers

Professional Development

Hard

Student preview

quiz-placeholder

60 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is the primary difference between a vulnerability and an exploit?

Back

A vulnerability is a weakness in a system, while an exploit is the method used to take advantage of that weakness.

2.

FLASHCARD QUESTION

Front

During which stage of the cyberattack lifecycle does an attacker gather information about a target? Options: Exploitation, Reconnaissance, Weaponization, Command-and-Control, Installation

Back

Reconnaissance

3.

FLASHCARD QUESTION

Front

Which of the following is an example of weaponization in the cyberattack lifecycle? Scanning for open ports on a target system., Creating a malicious payload to deliver via phishing email., Establishing a command-and-control server., Installing a backdoor on a compromised system., Exfiltrating sensitive data from the victim's system.

Back

Creating a malicious payload to deliver via phishing email.

4.

FLASHCARD QUESTION

Front

What happens during the exploitation phase of the cyberattack lifecycle?

Back

The attacker uses a vulnerability to gain unauthorized access to a system.

5.

FLASHCARD QUESTION

Front

What is the primary goal of the command-and-control (C2) stage?

Back

To establish ongoing communication with the compromised system.

6.

FLASHCARD QUESTION

Front

Which of the following best describes malware? Options: Software designed to monitor user activities without permission., A type of attack where malicious actors intercept communication., Any software intentionally designed to cause harm to a system., A large-scale attack designed to overwhelm network resources., A method of gaining unauthorized access by deceiving users.

Back

Any software intentionally designed to cause harm to a system.

7.

FLASHCARD QUESTION

Front

What is the primary purpose of spyware?

Back

Monitoring user activity and stealing sensitive information.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?