Search Header Logo

Cybersecurity Chapter 1 to 3 summary

Authored by E Sheng Toh

Computers

11th Grade

Used 3+ times

Cybersecurity Chapter 1 to 3 summary
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to hackers who hack for a cause?

hactivist

white hat

blue hat

hacker

Answer explanation

The term is used to describe gray hackers who rally and protect for a cause.

The correct answer is: hactivist

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

algorithm

DDoS

exhaustion

Answer explanation

Algorithm attacks can force computers to use memory or overwork the CPU.

The correct answer is: algorithm

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term BYOD represent?

bring your own device

bring your own disaster

bring your own decision

buy your own disaster

Answer explanation

The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,

The correct answer is: bring your own device

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

blue team

red hat

script kiddie

black hat

Answer explanation

Script kiddies is a term used to describe inexperienced hackers.

The correct answer is: script kiddie

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Linkedin

Palo Alto

Juniper

Answer explanation

A data domain is a repository for data.

The correct answer is: Linkedin

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

ping sweep

DDoS

DoS

spoof

Answer explanation

DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

The correct answer is: DDoS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

authorization

authentication

accounting

biometric

Answer explanation

Authorization determines whether a user has certain access privileges.

The correct answer is: authorization

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?