cyber security chapter 1 quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

The individual user profile on a social network site is an example of a/an _________________ identity.

online

What is another name for confidentiality of information?

privacy

Which method is used to check the integrity of data?

checksum

What three items are components of the CIA triad? (Choose three.)

confidentiality integrity availability

What is the motivation of a white hat attacker?

discovering weaknesses of networks and systems to improve the security level of these systems

What is an example of "hacktivism"?

A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.

What is a reason that internal security threats might cause greater damage to an organization than external security threats?

Internal users have direct access to the infrastructure devices.

Which statement describes cyber warfare?

It is Internet-based conflict that involves the penetration of information systems of other nations.

make political statements in order to create an awareness of issues that are important to them

hacktivists

gather intelligence or commit sabotage on specific goals on behalf of their government

state-sponsored attackers

make political statements, or create fear, by causing physical or psychological damage to victims

terrorists

What are three methods that can be used to ensure confidentiality of information? (Choose three.)

two factor authentication data encryption username ID and password


Conjuntos de estudio relacionados

MODULE 5: CONSIDERATIONS PEDIATRIC PATIENT

View Set

Ch.11 Leadership for a Growing Business

View Set

science electricity topics 4 and 5

View Set

Saunders Comprehensive NCLEX-PN: Ch 43 Endocrine Disorders***

View Set

Chapter 44: Digestive and Gastrointestinal Treatment Modalities

View Set

Life Insurance Policy Provisions, Options, and Riders

View Set

Les sujets du droit international public

View Set