
Cybersecurity Fundamentals - Chapter 1

Quiz
•
Other
•
Professional Development
•
Medium
Raymond Tan
Used 22+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of an Internet data domain?
Cisco
Juniper
Palo Alto
Answer explanation
An example of an Internet data domain is Linkedin. It is a popular social networking platform.
Refer to curriculum topic: 1.1.1
A data domain is a repository for data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the acronym IoE represent?
Internet of Everyday
Internet of Everything
Insight into Everything
Intelligence on Everything
Answer explanation
The acronym IoE stands for Internet of Everything, which represents the interconnectedness of everyday objects and devices through the internet, enabling data sharing and communication.
Refer to curriculum topic: 1.1.1
Internet of Everything is the term used for Internet-connected devices
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
APT
Refer to Chapter 1 - Slides 24 - Threat Complexity
Advanced persistent threat (APT) is a continuous computer hack that occurs under the radar against a specific object. Criminals usually choose an APT for business or political motives.
algorithm
Refer to curriculum topic: 1.4.2
Algorithm attacks can force computers to use memory or overwork the CPU.
DDoS
Refer to Chapter 1 - Slides 25 - Threat Complexity
Next generation 911 call centers are vulnerable because they use Voice-over-IP (VoIP) systems rather than traditional landlines. In addition to TDoS attacks, these call centers can also be at risk of distributed-denial-of-service (DDoS) attacks that use many systems to flood the resources of the target making the target unavailable to legitimate users
exhaustion
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term vulnerability mean?
a known target or victim machine
a method of attack to exploit a target
a potential threat that a hacker creates
a weakness that makes a target susceptible to an attack
Answer explanation
Vulnerability refers to a weakness that makes a target susceptible to an attack.
Refer to curriculum topic: 1.3.1
A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
DoS
spoof
DDoS
ping sweep
Answer explanation
DDoS attack uses many systems to flood the resources of a target, making it unavailable. It is a type of DoS attack.
Refer to curriculum topic: 1.4.2
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Match the following and name 1 types of records that cyber criminals would be interested in stealing from organizations.
Refer to Chapter 1 - Slides 14 Common Threats - Threat Arenas
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Thwarting cyber criminals includes which of the following? (Choose two.)
hiring hackers
changing operating systems
establishing early warning systems
sharing cyber Intelligence information
Answer explanation
Thwarting cyber criminals involves establishing early warning systems and sharing cyber intelligence information. These measures help detect and prevent cyber attacks effectively.
Refer to Chapter 1 - Slides 10 Cybersecurity Specialists
Thwarting the cyber criminals is a difficult task and there is no such thing as a “silver bullet.” However, company, government and international organizations have begun to take coordinated actions to limit or fend off cyber criminals. The coordinated actions include:
1) Vulnerability Database
2) Early Warning Systems
3) Share Cyber Intelligence
4) ISM Standards
5) New Laws
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Kamar's Quiz

Quiz
•
Professional Development
10 questions
Quiz Pertemuan 1

Quiz
•
Professional Development
7 questions
HISPAM Cyber Trip

Quiz
•
Professional Development
10 questions
DDoS

Quiz
•
KG - Professional Dev...
8 questions
Основные угрозы в компьютерных сетях (DDoS, фишинг, вирусы)

Quiz
•
Professional Development
10 questions
Solving cases with OSINT

Quiz
•
Professional Development
10 questions
Post Test Probis Sistem Capaian Output pada SAKTI

Quiz
•
Professional Development
10 questions
Cyber Security Awareness

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Other
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development