INTRODUCTION
Malware and its Types
CIA Triad
TYPES OF ATTACKS
Social Engineering
Types of Social Engineering Attacks
Why does Social Engineering works?
Denial of Service
Man In The Middle
Buffer Overflow
Injection attacks
Cross Site Scripting
ARP Poisoning
DNS Poisoning
Privilege Escalation
Amplification Attack
Man In The Browser Attack
Zero Day Attack
Replay Attack
Pass the Hash
Hijacking Attacks
Shimming and Refactoring
MAC and IP spoofing
Wireless Attacks
Cryptographic Attacks Types
Cryptographic Attacks Details
Birthday
Known plain textcipher text
Rainbow tables
Dictionary
Brute force
Collision
downgrade
Replay
Weak Implementations
Threat actor and their types
Penetration Testing
Penetration Testing vs Vulnerability Scanning
Vulnerability Scanning
Vulnerabilities Types & Impacts
Firewall & its Types
VPN Virtual Private Network
NIPS - Network Intrusion Prevention System | NIDS - Network Intrusion Detection System
Router
Switch
Proxy & its Types
Load balancer
Access Point
SIEM Security Information and Event Management
DLP Data Loss Prevention
NAC Network Access Control
Mail Gateway
Advanced Network Technologies Bridge, SSLTLS Accelerators, Decryptors, Media Gateway, HSM
Protocol Analyzer
Network Scanners
Wireless Scanners
Password Crackers
Vulnerability Scanner
Configuration compliance scanner
Exploitation frameworks
Data sanitization tools
SHREE LEARNING ACADEMY
Toggle Menu
Home
Tutorial
Quiz
Vulnerabilities: Types and Impacts Quiz
What is a race condition in the context of cybersecurity?
A competitive coding event
Processes competing for the same system resource
A type of computer virus
The time it takes for a system to boot up
Why are end-of-life systems considered vulnerable?
They receive too many updates
They are too new
They no longer receive updates or security patches
They are faster than newer systems
What is the risk associated with improper error handling?
Makes the system faster
Reveals too much information, aiding hackers
Makes the user interface more complex
Requires more storage space
What does proper input handling prevent?
Increases system speed
Allows all types of data input
Prevents system crashes and data leaks
I don't know
What is the importance of proper certificate and key management?
Allows easier access to the system
Acts as system IDs and passwords, requiring careful management
Increases the system's processing power
Makes the system more visually appealing
Submit answers
Your Score:
Go To Website's Tutorial Page
Read Tutorial
Watch our Video Tutorial