In cybersecurity, what term describes a weakness in a system or design that can be exploited by a threat actor?
Vulnerability
What term refers to a potential danger or actor that could take advantage of a system weakness?
Threat
What is the specific piece of code or technique used to take advantage of a vulnerability to cause unintended behavior?
Exploit
Which formula is used to calculate the level of risk associated with a specific vulnerability?
Risk = Likelihood x Impact
The path or method an attacker uses to gain unauthorized access to a system, such as a phishing email or unpatched port, is an _____.
Attack Vector
What is the process of securing a system by reducing its attack surface through measures like disabling unnecessary services?
Hardening
Which security strategy uses multiple layered controls throughout an infrastructure to ensure that if one fails, another is there to catch the threat?
Defense-in-Depth
Concept: Confidentiality
Definition: Ensuring that data is accessible only to authorized users to prevent unauthorized access.
Which component of the CIA triad ensures that data is accurate, complete, and has not been improperly modified?
Integrity
The goal of ensuring that authorized users can access the system and data when needed is called _____.
Availability
Which type of attacker uses pre-written tools and is primarily motivated by curiosity or bragging rights?
Script Kiddie
What is the primary motivation for a Hacktivist threat actor?
Promoting a political or social cause
Threat actors associated with Organized Crime are primarily motivated by _____.
Financial gain
Which type of threat actor works for a government and is motivated by espionage, economic advantage, or warfare?
State-Sponsored (Nation State)
What ethical guideline requires cybersecurity professionals to disclose vulnerabilities responsibly and maintain non-malicious intent?
Code of Ethics
What is the general term for malicious software designed to cause damage or gain unauthorized access to a system?
Malware
Which type of malware encrypts a victim’s files and demands payment for the decryption key?
Ransomware
What is the primary difference between a DoS attack and a DDoS attack?
A DDoS attack uses multiple compromised systems (a botnet) rather than a single source.
A network of compromised computers controlled by an attacker to perform malicious tasks is known as a _____.
Botnet
What technique involves manipulating people into divulging confidential information or performing unauthorized actions?
Social Engineering
Which phishing variant uses mass emails to trick a large group of users into revealing credentials?
Phishing
What is the term for a highly targeted phishing attack aimed at a specific individual or organization?
Spear Phishing
A targeted social engineering attack aimed specifically at a high-value individual, such as an executive, is called _____.
Whaling
What is the term for a phishing attack conducted specifically through voice calls or VoIP?
Vishing