Cybersecurity Flashcard

Cybersecurity Flashcard

Assessment

Flashcard

Other

12th Grade

Easy

Created by

Wayground Content

Used 1+ times

FREE Resource

Student preview

quiz-placeholder

20 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which of the following is a type of attack that uses multiple systems to flood a target with traffic, causing it to crash? Phishing, DoS (Denial of Service), DDoS (Distributed Denial of Service), Spoofing

Back

DDoS (Distributed Denial of Service)

Answer explanation

A DDoS (Distributed Denial of Service) attack uses multiple systems to overwhelm a target with traffic, leading to its crash. In contrast, DoS involves a single source, while phishing and spoofing are different types of attacks.

2.

FLASHCARD QUESTION

Front

What is the primary goal of a man-in-the-middle (MITM) attack?

Back

Intercepting and altering communications

Answer explanation

The primary goal of a man-in-the-middle (MITM) attack is intercepting and altering communications between two parties without their knowledge, allowing the attacker to manipulate the data being exchanged.

3.

FLASHCARD QUESTION

Front

Which type of malware disguises itself as a legitimate software to deceive users?

Back

Trojan

Answer explanation

A Trojan is a type of malware that pretends to be legitimate software, tricking users into installing it. Unlike worms or ransomware, Trojans do not replicate themselves but can cause significant harm once activated.

4.

FLASHCARD QUESTION

Front

Which of the following is a vulnerability scanner used to identify known vulnerabilities in a network? Nmap, Wireshark, Nessus, NetFlow

Back

Nessus

Answer explanation

Nessus is a widely used vulnerability scanner that identifies known vulnerabilities in a network. In contrast, Nmap is a network mapper, Wireshark is a packet analyzer, and NetFlow is a network traffic analysis tool.

5.

FLASHCARD QUESTION

Front

Which of the following security models is based on the principle of least privilege? Bell-LaPadula, Clark-Wilson, Brewer-Nash, Role-Based Access Control (RBAC)

Back

Role-Based Access Control (RBAC)

Answer explanation

Role-Based Access Control (RBAC) is based on the principle of least privilege, allowing users to access only the resources necessary for their role, thereby minimizing potential security risks.

6.

FLASHCARD QUESTION

Front

What is the primary purpose of network segmentation?

Back

To separate different types of data and systems

Answer explanation

The primary purpose of network segmentation is to separate different types of data and systems, enhancing security and performance by isolating traffic and reducing the risk of data breaches.

7.

FLASHCARD QUESTION

Front

Which of the following controls is used to ensure that only authorized users have access to resources? Preventive controls, Detective controls, Corrective controls, Access control

Back

Access control

Answer explanation

Access control is specifically designed to ensure that only authorized users can access resources, making it the correct choice. Preventive, detective, and corrective controls serve different purposes in security management.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?