Search Header Logo

Introduction to Cybersecurity Tools and Cyberattacks

Authored by Денис Ленин

Computers

University

Used 14+ times

Introduction to Cybersecurity Tools and Cyberattacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following legislative acts or agencies effectively ended the National Security Agency’s bulk collection of phone metadata?

USA Freedom Act

National Cyber Security Division(NCSD)

USA Patriot Act

Department of Homeland Security(DHS)

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How are organizations safeguarding their resources with the virtual shift following the COVID-19 pandemic? Select all that apply.

Creating bring-your-own-device(BYOD) policies

Intensifying cybersecurity awareness training for employees

Encoutaging employees to use public Wi-Fi networks for work

Providing employees with antivirus licenses for their personal computers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State True or False
National Security Decision Directives (NSDD 145) was America’s first national policy on telecommunication and automated information systems security.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The history of cybersecurity dates back several decades. When did the first computer worm, Creeper, emerge?

2000

1971

2010

1987

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept encourages software and system developers to integrate security features at the start of the development cycle?

Advanced encryption

National cybersecurity

Global surveillance

Security by design

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following illustrates the application of critical thinking in cybersecurity?

Performing routine backups

Conducting vulnerability scans

Installing antivirus software

Performing root cause analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the critical thinking model, what skills do you require to effectively perform particular tasks or functions within cybersecurity?

Administrative skills

Intellectual abilities

Technical skills

Interpersonal skills

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?