Search Header Logo

CF Chapter 1- 4

Authored by sam foon

Other

Professional Development

Used 6+ times

CF Chapter 1- 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Juniper

Linkedin

Palo Alto

Answer explanation

Refer to chapter 1 slide 4
A data domain is a repository for data.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

Answer explanation

refer to chapter 1 slide 5
Internet of Everything is the term used for Internet-connected devices

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

algorithm

DDoS

exhaustion

Answer explanation

refer to chapter 1 slide 24
Algorithm attacks can force computers to use memory or overwork the CPU.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

Answer explanation

Refer to chapter 1 slide 13

A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

spoof

DDoS

ping sweep

Answer explanation

Refer to chapter 1 slide 25
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Name 1 types of records that cyber criminals would be interested in stealing from organizations. (multiple answers)

personal, medical

education

employment

financial

Answer explanation

Refer to Chapter 1 - Slides 14 Common Threats - Threat Arenas
The following examples are just a few sources of data that can come from established organizations:
Personal Information
Medical Records
Education Records
Employment and Financial Records

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

changing operating systems

establishing early warning systems

sharing cyber Intelligence information

Answer explanation

Refer to Chapter 1 - Slides 10 Cybersecurity Specialists
Thwarting the cyber criminals is a difficult task and there is no such thing as a “silver bullet.” However, company, government and international organizations have begun to take coordinated actions to limit or fend off cyber criminals. The coordinated actions include:
1) Vulnerability Database
2) Early Warning Systems
3) Share Cyber Intelligence
4) ISM Standards
5) New Laws

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?