Explain the concept of privilege escalation in cyber attacks. Privilege escalation in the context of cyber attacks refers to
What is the role of a penetration tester in cybersecurity? A penetration tester, also known as an ethical hacker or
How does ransomware work, and what steps can be taken to prevent it? Ransomware is a type of malicious software that encrypts a
Define the term "phishing" and describe common phishing techniques. Phishing is a cyber-attack method in which attackers use deceptive
What is the purpose of a social engineering attack, and how can it be prevented? Social engineering is a type of cyberattack that relies on
Differentiate between active and passive reconnaissance in cyber attacks. Active and passive reconnaissance are two distinct approaches used in
Explain the concept of a zero-day vulnerability. A zero-day vulnerability refers to a security flaw in a
What is a DoS (Denial of Service) attack, and how can it be mitigated? A Denial of Service (DoS) attack is a malicious attempt
Describe the difference between a virus and a worm in the context of cybersecurity. 1. Virus: * Definition: A virus is a type of malware
11-20: Threats, Attacks, and Vulnerabilities 1. Threats: * Definition: A threat is any potential danger or