Search Header Logo

Chapter 1-Cybersecurity

Authored by Ria Castillo

Computers

University

Used 4+ times

Chapter 1-Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Juniper

Palo Alto

Linkedin

Cisco

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

sharing cyber Intelligence information

establishing early warning systems

changing operating systems

shutting down the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

DDoS

ping sweep

spoof

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to hackers who hack for a cause?

blue hat

hacker

hactivist

white hat

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

education

food

employment

rock

medical

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term BYOD represent?

buy your own disaster

bring your own decision

bring your own disaster

bring your own device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a amateur hacker?

red hat

blue team

script kiddie

black hat

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers