Sample Exams of Cybersecurity
In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests”
Which of the following would be classified as personal data? (1,2,3)
- Social security number
- Driver license number
- Date and place of birth
- Job title
- IP address
Which one is the confidentiality of information? (3,5,6)
- Backup
- Version control
- Data encryption
- File permission settings
- Two-factor authentication
- Username ID and password
Which one is in the McCumber Cube? (2,4,5)
- Access
- Integrity
- Scalability
- Availability
- Confidentiality
- Intervention
Types of Malware on cyber security
- Viruses: Viruses are self-replicating programs that attach themselves to legitimate files or software. When the infected program is executed, the virus spreads to other files or systems. Viruses can cause a wide range of damage, from data corruption to system crashes.
- Worms: Worms are like viruses but do not need a host file to propagate. They spread independently by exploiting vulnerabilities in network services, email systems, or other software. Worms can rapidly infect many devices.
- Trojans (or Trojan Horses): Trojans are disguised as legitimate software but contain hidden malicious code. They often trick users into installing them by pretending to be something useful. Once on a system, Trojans can perform a variety of malicious activities, such as stealing data or providing remote access to attackers.
- Ransomware: Ransomware encrypts a victim’s files or locks them out of their own system. The attacker then demands a ransom, typically in cryptocurrency, to provide the decryption key or restore access. Notable examples include WannaCry and Ryuk.
- Spyware: Spyware is designed to secretly gather information about a user’s activities and transmit it to an external source. It can record keystrokes, capture screenshots, and monitor web browsing habits, often for malicious purposes such as identity theft or corporate espionage.
- Adware: Adware, short for advertising-supported software, displays unwanted advertisements to users. While not always malicious, it can be invasive and negatively impact a user’s experience. In some cases, adware may collect and transmit user data without consent.
- Botnets: A botnet is a network of compromised computers, or “bots,” controlled by a central server. These bots can be used for various malicious purposes, such as launching Distributed Denial of Service (DDoS) attacks, sending spam, or conducting other cybercrimes.
- Keyloggers: Keyloggers record a user’s keystrokes, capturing sensitive information like passwords, credit card numbers, and other confidential data. This information is then sent to an attacker who can misuse it for financial gain.
- Rootkits: Rootkits are stealthy malware that is difficult to detect and remove. They typically gain privileged access to a computer’s operating system, making them particularly dangerous. Rootkits are often used to hide the presence of other malware.
- Fileless Malware: This type of malware does not rely on traditional files and operates in memory, making it harder to detect. It uses legitimate system tools and processes to carry out its malicious activities.
- Cryptojacking Malware: Cryptojacking malware is designed to hijack a victim’s computer or device to mine cryptocurrencies without their consent, using the device’s processing power and energy.
- Mobile Malware: Malware also affects mobile devices. This includes mobile viruses, Trojans, and spyware targeting smartphones and tablets.
You can find other learning for Security by clicking here.
Post Views: 373