Fill-in-the-Blank: Computer Security (Cybersecurity) Threats, Vulnerabilities, and Malware
Back to Pack

Fill-in-the-Blank: Computer Security (Cybersecurity) Threats, Vulnerabilities, and Malware

Complete the sentences by filling in the blanks. Each correct answer earns points!

14 Questions • 140 Total Points
1

is the process of protecting software, systems, and networks from threats that cause unauthorized disclosure, theft, damage, or service disruption.

Context: Computer Security (Cybersecurity) Scope

2

A is a flaw that compromises security, but an exploitable vulnerability has at least one working exploit.

Context: Vulnerability vs exploitable vulnerability

3

Most discovered vulnerabilities are documented in the database.

Context: CVE database

4

Threat actors can exploit the system if the vulnerability is , because at least one working exploit exists.

Context: Exploitable vulnerability

5

A is a secret method that bypasses normal authentication or security controls, often hidden in code or firmware.

Context: Backdoors

6

Backdoor is present (secret bypass of authentication/security controls) → attackers can gain remote administrative access and the system.

Context: Backdoor cause→effect relationship

7

Malware can install backdoors, enabling attackers to modify files, steal information, install unwanted software, and take control.

Context: Backdoor-enabled remote control

8

Denial-of-service traffic overwhelms resources or locks accounts → users cannot access intended .

Context: DoS cause→effect relationship

9

uses many points to block users at once, making defense harder than single-source blocking.

Context: DoS vs DDoS

10

Eavesdropping occurs on unsecured or unencrypted network traffic → sensitive data can be intercepted and later .

Context: Eavesdropping cause→effect relationship

11

Unlike many malware attacks, eavesdropping may not noticeably degrade performance, making detection .

Context: Eavesdropping detection difficulty

12

Phishing deceives users into entering credentials on a fake site → attackers can access the victim’s real .

Context: Phishing cause→effect relationship

13

is deceiving users to obtain sensitive information like usernames, passwords, or credit card details.

Context: Phishing as social engineering

14

SMBs are more likely to face malware, ransomware, phishing, man-in-the-middle attacks, and attacks.

Context: Threat actor target differences (SMBs)