0 of 15 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. To launch a cyber attack, attackers use a variety of techniques, including denial of service, malware, phishing, and __________.
2. It is a form of malicious software that is intended to harm computers, networks, and servers is known by the name _____________.
3. _____________ is the method of sending fraudulent communications that seems to come from a reputable source, usually through email.
4. In the MitM, the attacker is positioned in the _____________ of the two parties and can spy on their communication, often without being detected.
5. The DDoS attacks are similar like DoS but involve ____________ host machines.
6. ______________ attacks target software bugs that companies have yet to find and, as a result, have been unable to repair or patch.
7. A __________ attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
8. A botnet, shorthand for the _________network.
9. People conduct cyber attacks for a variety of reasons, the most common of which is __________ benefit.
10. An ____________ attack is a malicious attack perpetrated on a network or computer system by a person with authorized system access.
11. Negligent insider attacks are just a result of ___________ behavior but are not driven by malicious intent.
12. Threats that come from outside the organization are known as ________ attacks or threats.
13. External cyber security threats can come cyber criminals, _____________, and State-sponsored Attackers.
14. ________________ are individuals or groups of hackers who carry out malicious activity to promote a political agenda, religious belief, or social ideology.
15. _____________ attackers have particular objectives aligned with either the political, commercial, or military interests of their country of origin.