Search Header Logo
Cybersecurity - Midterm

Cybersecurity - Midterm

Assessment

Presentation

Computers

University

Medium

Created by

Paul Lavarez

Used 11+ times

FREE Resource

6 Slides • 19 Questions

1

​Review for Midterm Examination

IT Security and Management​

Paul Joseph C. Lavarez, MBA, MIT.

2

Fill in the Blanks

Type answer...

3

Multiple Choice

The 'C' in "CIA Triad" mean

1

confidentiality

2

communication

3

computer system

4

comfortable

4

Multiple Select

C.I.A means

1

confidentiality

2

integrity

3

availability

4

international

5

cybersecurity

5

Open Ended

What are some ways confidentiality is manage?

6

​Confidentiality

  1. Keeping levels of access and setting permissions

  2. Encrypting data and files

  3. Requiring multi-factor authentication

Some text here about the topic of discussion

7

​Integrity

  • Keeping backups of the data in its correct state, and logging versions

  • Using cryptography to securely check for changes.

  • Keeping track of digital signatures to prove the integrity of data.

Some text here about the topic of discussion

8

​Availability

  • Always monitoring servers and networks

  • Maintaining hardware and software

  • Having a plan for disaster recovery

Some text here about the topic of discussion

9

Multiple Choice

General term for people who try to get access to your computer without your permission in order to steal information which they could use for malicious or criminal purposes.

1

Domain

2

Hackers

3

Firewall

4

Anti-malware software

10

Multiple Choice

Software that encrypts programs and data until a ransom is paid to remove it.

1

ransomware

2

Anti-phishing software

3

Trojan Horse

4

Spyware

11

Fill in the Blanks

Type answer...

12

Multiple Choice

the art of protecting information by transforming it into an unreadable format.

1

Cryptojacking

2

Availability

3

Cryptography

4

Caesar Cipher

13

Fill in the Blanks

Type answer...

14

Draw

draw 'PHISHING"

15

Multiple Choice

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

1

Phishing

2

deepfake

3

Adware

4

Worm

16

Multiple Choice

Software that scans content to identify and dispose of phishing attempts.

1

Anti-phishing software

2

ransomware

3

Anti-spyware software

4

Malware

17

Multiple Choice

Phishing using text messages

1

Anti-phishing software

2

SMishing (SMS Phishing)

3

Anti-spyware software

4

Security Engineering

18

Multiple Choice

A method for confirming users' identities.

1

Caesar Cipher

2

Authentication

3

Decryption

4

Encryption

19

Poll

hackers use their social skills to trick people into revealing access credentials or other valuable information

Social Engineering

white hat hackers

hacktivist groups

Security Engineering

20

Multiple Choice

a technique for encryption that shifts the alphabet by some number of characters

1

Cryptojacking

2

Caesar Cipher

3

Cloud Security

4

CIA Triad

21

Draw

draw "CyberCrime"

22

Top 5 cyber crimes in 2022

  1. Phishing Scams.

  2. Website Spoofing.

  3. Ransomware.

  4. Malware.

  5. IOT Hacking.

Some text here about the topic of discussion

23

Fill in the Blanks

Type answer...

24

media

uses trial and error to try and break into a device, network, or website.​

Some text here about the topic of discussion.

Brute Force Attack

25

Multiple Choice

a program that appears desirable but actually contains something harmful

1

ransomware

2

Trojan Horse

3

anti-virus

4

adware remover

​Review for Midterm Examination

IT Security and Management​

Paul Joseph C. Lavarez, MBA, MIT.

Show answer

Auto Play

Slide 1 / 25

SLIDE