
CF Chapter 1- 4

Quiz
•
Other
•
Professional Development
•
Medium
sam foon
Used 6+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is an example of an Internet data domain?
Cisco
Juniper
Palo Alto
Answer explanation
Refer to chapter 1 slide 4
A data domain is a repository for data.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does the acronym IoE represent?
Internet of Everyday
Internet of Everything
Insight into Everything
Intelligence on Everything
Answer explanation
refer to chapter 1 slide 5
Internet of Everything is the term used for Internet-connected devices
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
APT
algorithm
DDoS
exhaustion
Answer explanation
refer to chapter 1 slide 24
Algorithm attacks can force computers to use memory or overwork the CPU.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does the term vulnerability mean?
a known target or victim machine
a method of attack to exploit a target
a potential threat that a hacker creates
a weakness that makes a target susceptible to an attack
Answer explanation
Refer to chapter 1 slide 13
A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
DoS
spoof
DDoS
ping sweep
Answer explanation
Refer to chapter 1 slide 25
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Name 1 types of records that cyber criminals would be interested in stealing from organizations. (multiple answers)
personal, medical
education
employment
financial
Answer explanation
Refer to Chapter 1 - Slides 14 Common Threats - Threat Arenas
The following examples are just a few sources of data that can come from established organizations:
Personal Information
Medical Records
Education Records
Employment and Financial Records
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Thwarting cyber criminals includes which of the following? (Choose two.)
hiring hackers
changing operating systems
establishing early warning systems
sharing cyber Intelligence information
Answer explanation
Refer to Chapter 1 - Slides 10 Cybersecurity Specialists
Thwarting the cyber criminals is a difficult task and there is no such thing as a “silver bullet.” However, company, government and international organizations have begun to take coordinated actions to limit or fend off cyber criminals. The coordinated actions include:
1) Vulnerability Database
2) Early Warning Systems
3) Share Cyber Intelligence
4) ISM Standards
5) New Laws
Create a free account and access millions of resources
Similar Resources on Wayground
40 questions
Alvin Standards

Quiz
•
Professional Development
41 questions
Test Your Knowledge_Hunting_Domestic_Tenured_EN

Quiz
•
Professional Development
35 questions
Domestic Gas

Quiz
•
Professional Development
36 questions
Excel, Tableau and Power BI Quiz

Quiz
•
Professional Development
45 questions
Chapter 1: The History of Barbering

Quiz
•
Professional Development
40 questions
Shadow Mod 5 B1/2

Quiz
•
Professional Development
35 questions
FORGCF3

Quiz
•
Professional Development
40 questions
SMCS Lore Quiz

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade