CF Chapter 1- 4

CF Chapter 1- 4

Professional Development

40 Qs

quiz-placeholder

Similar activities

Murarz tynkarz 14/22

Murarz tynkarz 14/22

Professional Development

40 Qs

Tìm hiểu Nghị quyết- Final

Tìm hiểu Nghị quyết- Final

Professional Development

36 Qs

ĐỀ THI CHỨNG CHỈ ĐẠI LÝ PNT SỐ 7

ĐỀ THI CHỨNG CHỈ ĐẠI LÝ PNT SỐ 7

Professional Development

41 Qs

GROAP 14 - 2022

GROAP 14 - 2022

Professional Development

35 Qs

Automotive technician evaluation exam

Automotive technician evaluation exam

Professional Development

37 Qs

ಕ್ವಿಜ್ ಸರಣಿ 76 : ಸಿರಿ ಕನ್ನಡ ನುಡಿ ಬಳಗ

ಕ್ವಿಜ್ ಸರಣಿ 76 : ಸಿರಿ ಕನ್ನಡ ನುಡಿ ಬಳಗ

8th Grade - Professional Development

40 Qs

SOAL PRAKARYA limbah organik 7

SOAL PRAKARYA limbah organik 7

1st Grade - Professional Development

35 Qs

BSO Challenge 3

BSO Challenge 3

Professional Development

35 Qs

CF Chapter 1- 4

CF Chapter 1- 4

Assessment

Quiz

Other

Professional Development

Practice Problem

Medium

Created by

sam foon

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Juniper

Linkedin

Palo Alto

Answer explanation

Refer to chapter 1 slide 4
A data domain is a repository for data.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

Answer explanation

refer to chapter 1 slide 5
Internet of Everything is the term used for Internet-connected devices

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

algorithm

DDoS

exhaustion

Answer explanation

refer to chapter 1 slide 24
Algorithm attacks can force computers to use memory or overwork the CPU.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

Answer explanation

Refer to chapter 1 slide 13

A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

spoof

DDoS

ping sweep

Answer explanation

Refer to chapter 1 slide 25
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Name 1 types of records that cyber criminals would be interested in stealing from organizations. (multiple answers)

personal, medical

education

employment

financial

Answer explanation

Refer to Chapter 1 - Slides 14 Common Threats - Threat Arenas
The following examples are just a few sources of data that can come from established organizations:
Personal Information
Medical Records
Education Records
Employment and Financial Records

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

changing operating systems

establishing early warning systems

sharing cyber Intelligence information

Answer explanation

Refer to Chapter 1 - Slides 10 Cybersecurity Specialists
Thwarting the cyber criminals is a difficult task and there is no such thing as a “silver bullet.” However, company, government and international organizations have begun to take coordinated actions to limit or fend off cyber criminals. The coordinated actions include:
1) Vulnerability Database
2) Early Warning Systems
3) Share Cyber Intelligence
4) ISM Standards
5) New Laws

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?