CF Chapter 1- 4

CF Chapter 1- 4

Professional Development

40 Qs

quiz-placeholder

Similar activities

Domestic Cold Water 6035-02 | Part 2

Domestic Cold Water 6035-02 | Part 2

Professional Development

40 Qs

bahasa inggris kelas 11

bahasa inggris kelas 11

Professional Development

40 Qs

MGNF Quiz - 62

MGNF Quiz - 62

Professional Development

40 Qs

MGNF Quiz - 63

MGNF Quiz - 63

Professional Development

40 Qs

Common Plumbing Processes 6035-02

Common Plumbing Processes 6035-02

Professional Development

37 Qs

Hot Water L2 6035

Hot Water L2 6035

Professional Development

43 Qs

NIMS Measurement, Materials, & Safety

NIMS Measurement, Materials, & Safety

9th Grade - Professional Development

41 Qs

VSM CA Revision I - Unit 1 to 4

VSM CA Revision I - Unit 1 to 4

Professional Development

40 Qs

CF Chapter 1- 4

CF Chapter 1- 4

Assessment

Quiz

Other

Professional Development

Medium

Created by

sam foon

Used 6+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Juniper

Linkedin

Palo Alto

Answer explanation

Refer to chapter 1 slide 4
A data domain is a repository for data.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

Answer explanation

refer to chapter 1 slide 5
Internet of Everything is the term used for Internet-connected devices

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

algorithm

DDoS

exhaustion

Answer explanation

refer to chapter 1 slide 24
Algorithm attacks can force computers to use memory or overwork the CPU.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

Answer explanation

Refer to chapter 1 slide 13

A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

spoof

DDoS

ping sweep

Answer explanation

Refer to chapter 1 slide 25
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Name 1 types of records that cyber criminals would be interested in stealing from organizations. (multiple answers)

personal, medical

education

employment

financial

Answer explanation

Refer to Chapter 1 - Slides 14 Common Threats - Threat Arenas
The following examples are just a few sources of data that can come from established organizations:
Personal Information
Medical Records
Education Records
Employment and Financial Records

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

changing operating systems

establishing early warning systems

sharing cyber Intelligence information

Answer explanation

Refer to Chapter 1 - Slides 10 Cybersecurity Specialists
Thwarting the cyber criminals is a difficult task and there is no such thing as a “silver bullet.” However, company, government and international organizations have begun to take coordinated actions to limit or fend off cyber criminals. The coordinated actions include:
1) Vulnerability Database
2) Early Warning Systems
3) Share Cyber Intelligence
4) ISM Standards
5) New Laws

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?