Cybersecurity Flashcard

Cybersecurity Flashcard

Assessment

Flashcard

•

Computers

•

Professional Development

•

Practice Problem

•

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

60 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is the primary difference between a vulnerability and an exploit?

Back

A vulnerability is a weakness in a system, while an exploit is the method used to take advantage of that weakness.

2.

FLASHCARD QUESTION

Front

During which stage of the cyberattack lifecycle does an attacker gather information about a target? Options: Exploitation, Reconnaissance, Weaponization, Command-and-Control, Installation

Back

Reconnaissance

3.

FLASHCARD QUESTION

Front

Which of the following is an example of weaponization in the cyberattack lifecycle? Scanning for open ports on a target system., Creating a malicious payload to deliver via phishing email., Establishing a command-and-control server., Installing a backdoor on a compromised system., Exfiltrating sensitive data from the victim's system.

Back

Creating a malicious payload to deliver via phishing email.

4.

FLASHCARD QUESTION

Front

What happens during the exploitation phase of the cyberattack lifecycle?

Back

The attacker uses a vulnerability to gain unauthorized access to a system.

5.

FLASHCARD QUESTION

Front

What is the primary goal of the command-and-control (C2) stage?

Back

To establish ongoing communication with the compromised system.

6.

FLASHCARD QUESTION

Front

Which of the following best describes malware? Options: Software designed to monitor user activities without permission., A type of attack where malicious actors intercept communication., Any software intentionally designed to cause harm to a system., A large-scale attack designed to overwhelm network resources., A method of gaining unauthorized access by deceiving users.

Back

Any software intentionally designed to cause harm to a system.

7.

FLASHCARD QUESTION

Front

What is the primary purpose of spyware?

Back

Monitoring user activity and stealing sensitive information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?