Search Header Logo

KYT/CAT - Cyber Security

Computers

1st Grade - University

Used 1K+ times

KYT/CAT - Cyber Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The integrity threat can be examplified by which of the following scenarios:

Customer records were hidden, but might have been slightly garbled

Every customer record is exposed by nation states

The entire company database was posted to the Internet.

Every customer record is stolen by hackers

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Let's talk about adversary types: we can say that Hacktivists are?

Motivated by greed, well funded and being tracked in increasingly efficient ways

Motivated by curiosity and predictable

Motivated by anger and unpredictable and well organized

Motivated by dominance and being supported by world class means

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The art and science of breaking code is called

Cryptography

Cryptanalysis

Encryption

Decryption

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The art and science of creating code is called

Cryptography

Cryptanalysis

Encryption

Decryption

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Distribution, amplification, spoofing and reflection are fundamental notions of what ?

Integrity threats
Adversary types
Availability threats
Confidentiality threats

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Let's talk about adversary types: we can say that vandals are?

Motivated by curiosity and predictable
Motivated by greed, well funded and being tracked in increasingly efficient ways
Motivated by anger and unpredictable and well organized
Motivated by dominance and being supported by world class means

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In the words of Ritchie and Thompson, what is a Shell ?

The command interpreter that looks after the communication between the user and the system
The OS that manages the control of the machine and supervises the scheduling of the programs
None of these answers
The utility tasks

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?