cyber security chapter 1 quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is an example of "hacktivism"?

A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.

Which method is used to check the integrity of data?

checksum

What three items are components of the CIA triad? (Choose three.)

confidentiality integrity availability

What is the motivation of a white hat attacker?

discovering weaknesses of networks and systems to improve the security level of these systems

make political statements in order to create an awareness of issues that are important to them

hacktivists

The individual user profile on a social network site is an example of a/an _________________ identity.

online

What is another name for confidentiality of information?

privacy

gather intelligence or commit sabotage on specific goals on behalf of their government

state-sponsored attackers

make political statements, or create fear, by causing physical or psychological damage to victims

terrorists

What are three methods that can be used to ensure confidentiality of information? (Choose three.)

two factor authentication data encryption username ID and password

What is a reason that internal security threats might cause greater damage to an organization than external security threats?

Internal users have direct access to the infrastructure devices.

Which statement describes cyber warfare?

It is Internet-based conflict that involves the penetration of information systems of other nations.


Kaugnay na mga set ng pag-aaral

Ch.11 Leadership for a Growing Business

View Set

science electricity topics 4 and 5

View Set

Chapter 44: Digestive and Gastrointestinal Treatment Modalities

View Set

Life Insurance Policy Provisions, Options, and Riders

View Set

Les sujets du droit international public

View Set

Chapter 45: Nursing Management: Patients With Neurologic Trauma

View Set