
Cybersecurity Fundamentals - Chapter 1
Authored by Raymond Tan
Other
Professional Development
Used 22+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of an Internet data domain?
Cisco
Juniper
Palo Alto
Answer explanation
An example of an Internet data domain is Linkedin. It is a popular social networking platform.
Refer to curriculum topic: 1.1.1
A data domain is a repository for data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the acronym IoE represent?
Internet of Everyday
Internet of Everything
Insight into Everything
Intelligence on Everything
Answer explanation
The acronym IoE stands for Internet of Everything, which represents the interconnectedness of everyday objects and devices through the internet, enabling data sharing and communication.
Refer to curriculum topic: 1.1.1
Internet of Everything is the term used for Internet-connected devices
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
APT
Refer to Chapter 1 - Slides 24 - Threat Complexity
Advanced persistent threat (APT) is a continuous computer hack that occurs under the radar against a specific object. Criminals usually choose an APT for business or political motives.
algorithm
Refer to curriculum topic: 1.4.2
Algorithm attacks can force computers to use memory or overwork the CPU.
DDoS
Refer to Chapter 1 - Slides 25 - Threat Complexity
Next generation 911 call centers are vulnerable because they use Voice-over-IP (VoIP) systems rather than traditional landlines. In addition to TDoS attacks, these call centers can also be at risk of distributed-denial-of-service (DDoS) attacks that use many systems to flood the resources of the target making the target unavailable to legitimate users
exhaustion
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term vulnerability mean?
a known target or victim machine
a method of attack to exploit a target
a potential threat that a hacker creates
a weakness that makes a target susceptible to an attack
Answer explanation
Vulnerability refers to a weakness that makes a target susceptible to an attack.
Refer to curriculum topic: 1.3.1
A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
DoS
spoof
DDoS
ping sweep
Answer explanation
DDoS attack uses many systems to flood the resources of a target, making it unavailable. It is a type of DoS attack.
Refer to curriculum topic: 1.4.2
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Match the following and name 1 types of records that cyber criminals would be interested in stealing from organizations.
Refer to Chapter 1 - Slides 14 Common Threats - Threat Arenas
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Thwarting cyber criminals includes which of the following? (Choose two.)
hiring hackers
changing operating systems
establishing early warning systems
sharing cyber Intelligence information
Answer explanation
Thwarting cyber criminals involves establishing early warning systems and sharing cyber intelligence information. These measures help detect and prevent cyber attacks effectively.
Refer to Chapter 1 - Slides 10 Cybersecurity Specialists
Thwarting the cyber criminals is a difficult task and there is no such thing as a “silver bullet.” However, company, government and international organizations have begun to take coordinated actions to limit or fend off cyber criminals. The coordinated actions include:
1) Vulnerability Database
2) Early Warning Systems
3) Share Cyber Intelligence
4) ISM Standards
5) New Laws
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Anime Quiz
Quiz
•
KG - Professional Dev...
11 questions
Types of Mass Media
Quiz
•
10th Grade - Professi...
10 questions
All About MS Teams
Quiz
•
Professional Development
15 questions
Agency OBX -Day 1 Quiz
Quiz
•
Professional Development
10 questions
SSO Briefing Day 2024
Quiz
•
Professional Development
10 questions
GUL Competence Stream: 4G Troubleshooting
Quiz
•
Professional Development
10 questions
Quiz This Week - 4
Quiz
•
Professional Development
15 questions
PCSL CHRISTMAS QUIZ
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Other
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development