5.3 Cyber Security (ATTACKS) Flashcards

(54 cards)

1
Q

What is a brute-force attack?

A

A hacking method that uses trial-and-error to crack passwords, login credentials, or encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a brute-force attack work?

A

By systematically trying every possible combination of letters, numbers, and symbols until the correct one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is brute-force still effective on weak passwords?

A

Because common or short passwords are tried first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name five commonly used passwords attackers try first.

A

123456, password, qwerty, 111111, abc123.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a word list in brute-force attacks?

A

A text file containing common words used to reduce the number of attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is a word-list attack faster than full trial-and-error?

A

Because common passwords are more likely to be found earlier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is data interception?

A

Stealing data by tapping into a wired or wireless communication link without authorisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is data intercepted in wired networks?

A

Using a packet sniffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a packet sniffer do?

A

Examines data packets sent over a network and sends them to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is data intercepted in wireless networks?

A

Using wardriving (access point mapping).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What equipment is used in wardriving?

A

Laptop/smartphone, antenna, GPS device, and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is wardriving dangerous?

A

It allows hackers to steal personal data without the user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can data interception be prevented?

A

Using WEP encryption, firewalls, and complex router passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Denial of Service (DoS) attack?

A

Sending many requests from one computer to overload a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the effect of a DoS attack?

A

The server crashes, slows down, or fails to respond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Distributed Denial of Service (DDoS) attack?

A

Multiple computers (bots) flood a server with requests simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is a DDoS attack more dangerous than a DoS attack?

A

It comes from multiple locations and is harder to block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What services can a DoS/DDoS attack prevent access to?

A

Emails, websites, and online services such as banking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of DoS/DDoS attacks?

A

To disrupt the operation of a web server or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why does a DDoS attack prevent website access?

A

The server is flooded with traffic and crashes or halts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How can a DDoS attack target email accounts?

A

By sending大量 spam emails until the mailbox quota is full.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

State three signs of a DoS/DDoS attack

A

Slow network, inaccessible websites, large amounts of spam emails.

23
Q

What devices help prevent DoS/DDoS attacks?

A

Firewall or proxy server.

24
Q

State four prevention methods for DoS/DDoS attacks.

A

Firewall, proxy server, up-to-date malware checker, email filters

25
What is hacking?
Gaining unauthorised access to a computer system or data
26
State four effects of hacking.
Identity theft, data deletion, data corruption, data alteration
27
Q: Name five methods to prevent hacking.
A: Firewalls, strong passwords, biometrics, two-step verification, anti-hacking software.
28
Q: Why does encryption not stop hacking?
A: Hackers can still access and modify data, but cannot understand it without a key.
29
Q: What is ethical hacking?
A: Legal hacking done with permission to test system security.
30
Q: How is ethical hacking different from malicious hacking?
A: Ethical hacking is authorised and legal; malicious hacking is illegal.
31
Q: What is malware?
A: Software designed to damage data or disrupt a computer system.
32
Q: How can malware enter a system?
A: USB devices, suspicious websites, outdated OS, downloaded files, buffer overflow.
33
Q: How can malware effects be restricted?
A: Strong passwords, logging off, not sharing passwords, anti-malware software.
34
Q: What is a virus?
A: Malicious software that replicates itself and damages or deletes data.
35
Q: Why does a virus need a host program?
A: It must attach to an active program or infected OS to run.
36
Q: State three effects of a virus.
A: Crashes system, deletes data, corrupts files.
37
Q: How can viruses be prevented?
A: Anti-virus software, firewall/proxy server, restricted access.
38
Q: What is a worm?
A: Malware that replicates itself automatically using a network.
39
Q: How is a worm different from a virus?
A: A worm does not need a host program.
40
Q: State four effects of worms.
A: Corrupt data, delete files, consume bandwidth, overload servers.
41
Q: What is a Trojan horse?
A: Malware disguised as legitimate software.
42
Q: State three effects of a Trojan horse.
A: Data theft, file deletion, identity theft.
43
Q: What is adware?
A: Malware that displays unwanted advertisements.
44
Q: State two effects of adware.
A: Slows system, installs spyware or viruses.
45
Q: What is ransomware?
A: Malware that encrypts files and demands payment to unlock them.
46
Q: State two effects of ransomware.
A: Financial loss, damage to reputation.
47
Q: What is spyware?
A: Malware that records user activity, including key presses.
48
Q: How does keylogging spyware work?
A: Records keystrokes and sends data to a third party.
49
Q: How can spyware be prevented?
A: Biometrics, firewall/proxy server, anti-spyware software.
50
Q: Why do on-screen keyboards defeat spyware?
A: No physical keys are pressed.
51
Q: What is pharming?
A: Redirecting users from a real website to a fake one.
52
Q: One key difference between phishing and pharming?
A: Phishing uses emails; pharming uses malicious code.
53
Q: What is social engineering?
A: Manipulating people into revealing information by exploiting emotions.
54
Q: Name three emotions exploited in social engineering.
A: Fear, curiosity, trust.