Back to notes
What is an Advanced Persistent Threat (APT) in the context of cyber security?
Press to flip
An APT is a prolonged network attack by unauthorized users to gain and maintain access to a network for stealing confidential information.
What is the primary function of a firewall in cyber security?
A firewall filters incoming and outgoing network traffic to block unauthorized access and ensure network security.
What role does a Security Architect play in cyber security?
A Security Architect designs robust security structures and frameworks to protect an organization’s information systems from cyber attacks.
What type of cyber attack did Anne fall victim to when she responded to a fraudulent email?
Phishing Attack
Give an example of a cyber attack where hackers manipulate SQL queries to gain unauthorized access to a database.
SQL Injection Attack
Why is it important to use unique alphanumeric passwords?
Unique alphanumeric passwords are harder for attackers to guess or crack, providing better security against password attacks.
What types of malware can infect a system via suspicious attachments?
Examples of malware include Trojan, Adware, and Spyware.
Explain the difference between a DoS and a DDoS attack.
A DoS (Denial of Service) attack floods a network with traffic to block legitimate requests, while a DDoS (Distributed Denial of Service) attack uses multiple systems to launch a coordinated attack, making it more difficult to defend against.
How do hackers perform a password attack?
Hackers perform password attacks by guessing common combinations or using brute force methods to crack passwords.
What is a honeypot in cyber security?
A honeypot is a dummy system designed to attract attackers and protect real systems by redirecting malicious activities away from them.
Why do organizations deploy antivirus software?
Organizations deploy antivirus software to detect, prevent, and remove malware infections from their systems.
Describe a Man-in-the-Middle Attack.
In a Man-in-the-Middle Attack, the hacker intercepts communication between a device and a server by taking over the client's IP address, often using unsecured Wi-Fi networks or malware.
What is the role of the Chief Information Security Officer (CISO) in an organization?
The CISO ensures the overall safety and security of the enterprise’s information and oversees the implementation of cybersecurity policies and practices.
What is an example of a cyber attack that involves sending fraudulent emails to steal sensitive data?
Why is cyber security a lucrative career choice according to the notes?
As global digital data increases, the threat of cyber attacks rises, creating a high demand for certified cybersecurity professionals, hence making it a lucrative career choice.
Previous
Next