Recall & Review
beginner
What is an attack surface in cybersecurity?
An attack surface is all the points where an unauthorized user can try to enter or extract data from a system. It includes all the ways a system can be attacked.
Click to reveal answer
beginner
Define attack vector.
An attack vector is the method or path used by a hacker to gain access to a system or network. It is how the attack is carried out.
Click to reveal answer
beginner
Give an example of an attack surface in everyday technology.
An example is a smartphone's Wi-Fi connection. If it is open or weakly secured, it can be an attack surface where hackers try to connect and steal data.
Click to reveal answer
intermediate
Why is reducing the attack surface important?
Reducing the attack surface means fewer ways for attackers to get in. This lowers the chance of a successful attack and makes systems safer.
Click to reveal answer
intermediate
Name three common attack vectors.
Common attack vectors include phishing emails, unsecured Wi-Fi networks, and malware-infected websites.
Click to reveal answer
What does the term 'attack surface' refer to?
✗ Incorrect
The attack surface is all the points where an attacker can try to enter or extract data from a system.
Which of the following is an example of an attack vector?
✗ Incorrect
An attack vector is the method or path used by an attacker to gain access.
Why should organizations reduce their attack surface?
✗ Incorrect
Reducing the attack surface lowers the number of ways attackers can enter, making attacks less likely.
Which of these is NOT a common attack vector?
✗ Incorrect
Strong passwords help protect systems and are not attack vectors.
An open Wi-Fi network is an example of what?
✗ Incorrect
An open Wi-Fi network is a point where attackers can try to enter, so it is part of the attack surface.
Explain in your own words what an attack surface is and why it matters in cybersecurity.
Think about all the ways someone could try to break into your phone or computer.
You got /3 concepts.
Describe what an attack vector is and give two examples.
Consider how hackers actually get into systems, not just where they can try.
You got /3 concepts.