Search Header Logo

Cybersecurity Chapter 1

Authored by E Sheng Toh

Computers

11th Grade

Used 2+ times

Cybersecurity Chapter 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to hackers who hack for a cause?

hactivist

white hat

blue hat

hacker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Analyze

Securely Provision

Oversight and Development

Protect and Defend

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term BYOD represent?

bring your own device

bring your own disaster

bring your own decision

bring your own dog

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

blue team

script kiddie

black hat

red hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Linkedin

Cisco

Juniper

Palo Alto

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a weakness that makes a target susceptible to an attack

a method of attack to exploit a target

a potential threat that a hacker creates

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Intelligence on Everything

Internet of Everyday

Internet of Everything

Insight into Everything

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?