Cybersecurity Fundamentals - Chapter 1

Cybersecurity Fundamentals - Chapter 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

Among Us

Among Us

KG - Professional Development

10 Qs

Insider Threats Quiz

Insider Threats Quiz

Professional Development

15 Qs

Ciberseguridad

Ciberseguridad

Professional Development

11 Qs

Rod Quiz

Rod Quiz

University - Professional Development

10 Qs

Mine craft quiz

Mine craft quiz

Professional Development

7 Qs

logo

logo

Professional Development

11 Qs

Battle of the BAU

Battle of the BAU

Professional Development

15 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

Cybersecurity Fundamentals - Chapter 1

Cybersecurity Fundamentals - Chapter 1

Assessment

Quiz

Other

Professional Development

Medium

Created by

Raymond Tan

Used 22+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Juniper

Linkedin

Palo Alto

Answer explanation

An example of an Internet data domain is Linkedin. It is a popular social networking platform.

Refer to curriculum topic: 1.1.1

A data domain is a repository for data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

Answer explanation

The acronym IoE stands for Internet of Everything, which represents the interconnectedness of everyday objects and devices through the internet, enabling data sharing and communication.

Refer to curriculum topic: 1.1.1

Internet of Everything is the term used for Internet-connected devices

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT
Refer to Chapter 1 - Slides 24 - Threat Complexity

Advanced persistent threat (APT) is a continuous computer hack that occurs under the radar against a specific object. Criminals usually choose an APT for business or political motives.

algorithm
Refer to curriculum topic: 1.4.2

Algorithm attacks can force computers to use memory or overwork the CPU.

DDoS
Refer to Chapter 1 - Slides 25 - Threat Complexity

Next generation 911 call centers are vulnerable because they use Voice-over-IP (VoIP) systems rather than traditional landlines. In addition to TDoS attacks, these call centers can also be at risk of distributed-denial-of-service (DDoS) attacks that use many systems to flood the resources of the target making the target unavailable to legitimate users

exhaustion

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

Answer explanation

Vulnerability refers to a weakness that makes a target susceptible to an attack.


Refer to curriculum topic: 1.3.1

A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

spoof

DDoS

ping sweep

Answer explanation

DDoS attack uses many systems to flood the resources of a target, making it unavailable. It is a type of DoS attack.

Refer to curriculum topic: 1.4.2

DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Match the following and name 1 types of records that cyber criminals would be interested in stealing from organizations.

Refer to Chapter 1 - Slides 14 Common Threats - Threat Arenas

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

changing operating systems

establishing early warning systems

sharing cyber Intelligence information

Answer explanation

Thwarting cyber criminals involves establishing early warning systems and sharing cyber intelligence information. These measures help detect and prevent cyber attacks effectively.

Refer to Chapter 1 - Slides 10 Cybersecurity Specialists

Thwarting the cyber criminals is a difficult task and there is no such thing as a “silver bullet.” However, company, government and international organizations have begun to take coordinated actions to limit or fend off cyber criminals. The coordinated actions include:

1) Vulnerability Database

2) Early Warning Systems

3) Share Cyber Intelligence

4) ISM Standards

5) New Laws

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?