Match the cybersecurity term with the respective description.

IT Questions BankCategory: Network Support and SecurityMatch the cybersecurity term with the respective description.

Match the cybersecurity term with the respective description.

Explanation: Place the options in the following order:

Trojan horse attacks This is malware that carries out malicious operations by masking its true intent.
Ransomware attacks This is malware that is designed to hold a computer system or the data it contains captive through encryption, until a payment is made.
Domain hijacking attacks This is when an attacker wrongfully gains control of a target’s DNS information so that they can make unauthorized changes to it.
Zero day attacks This type of attack exploits software vulnerabilities before they become known or before they are disclosed by the software vendor.
Denial of Service attacks This is when a network, host, or application is sent an enormous amount of data at a rate which it cannot handle. This causes a slowdown in transmission or response, or causes the device or service to crash.
Logic Bombs attacks This is a malicious program that waits for a trigger, such as a specified date or database entry, to set off malicious code.

Exam with this question: 2.3.13 Check Your Understanding - Cyber Attacks

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments