Cyber test questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Identify the principle from the Health Belief Model that best corresponds with the statement "7% of the individuals victimized by identify theft reported feeling suicidal." A. susceptibility B. severity C. cues to action D. self-efficacy E. barriers

Severity

Psychological manipulation of people into performing actions or divulging confidential information - also known as a con or fraud scheme is a definition of A. computer crime B. social engineering C. persuasion D. coercion

Social engineering

Why would a researcher use a random sample when conducting a study?

To describe the population

Cookies are text files with small pieces of data — like a username and password — that are used to identify your computer as you use a computer network. True or False

True

Cyber-mindful training moves people from peripheral processing to central processing or carelessness to mindfulness. True or False

True

In the classical conditioning explanation of cell phone addiction or attraction, once the cellphone is associated with dopamine production (feeling good), people become anxious even their phones are not available. True or False

True

Operant conditioning suggests that people become conditioned to click on links because when they have clicked on links in the past their behavior was reinforced. True or False

True

Research on fear appeals suggests people are only motivated to change their behavior if they feel efficacious. True or False

True

Researchers adapting the health belief model to use in the realm of cybersecurity is an example of intension. True or False

True

The research by Ellen Langer (Xerox Machine Study) suggests that the size of the request influences how people process information. True or False

True

The research by Ellen Langer (Xerox Machine Study) suggests that when people are making decisions they use heuristics like the word because so they do not have to carefully process the information. True or False

True

The term bounded rationality means that people behave in ways that are consistent with their goals but they are limited or restricted by the information they have and their ability to process that information. True or False

True

The term cognitive response refers to those thoughts we have when we are exposed to information or messages of others. True or False

True

The term punishment means decrease the rate, likelihood or probability of a target behavior occurring. True or False

True

The term rationality refers to people behaving in ways that are consistent with their goals. True or False

True

The term reinforcement means increase the rate, likelihood or probability of a target behavior occurring. True or False

True

The term self-efficacy means that a person believes they can be successful at performing a particular behavior True or False

True

There is evidence that our thoughts or cognitive responses may impact our attitudes more than the actual message that prompted the cognitive response. True or False

True

Using fear to motivate cyber-security behavior increases the risk of making people cyber-fatigued. True or False

True

Ivan Pavlov noticed his dogs salivated when he showed them meat. Pavlov paired the meat with the ringing of a bell. After a time, the dogs would salivate at the sound of a bell. The meat is the A. Conditioned Stimulus B. Unconditioned Stimulus C. Unconditioned Response D. Previously Conditioned Stimulus

Unconditioned Stimulus

Identify the principle from the Health Belief Model that best corresponds with the statement "15 million consumers experienced identity theft in 2020."

susceptibility

What are the three requirements for establishing causality?

the three requirements for establishing causality are time order, covariation and rule out alternative explanations.

Why would a researcher use a non-random or a nonprobability sample in a study?

they would use a non-random sample if no sampling frame exists

The statement females are less susceptible to phishing attacks than males is an example of A. a null hypothesis B. an active directional hypothesis (one tailed) C. an active non-directional hypothesis (two tailed) D. a research question

An active directional hypothesis (one tailed)

Identify the principle from the Health Belief Model that best corresponds with the statement "it is more difficult to remember unique passwords for all of your accounts than it is to rely on a single password." A. susceptibility B. severity C. barriers D. benefits E. cues to action

Barriers

Identify the principle from the Health Belief Model that best corresponds with the statement "maintaining a unique password for all of your accounts reduces the risk of identity theft by 50%." A. severity B. barrier C. cues to action D. benefit E. susceptibility

Benefit

Dropping malware infected USB drives is an example of which type of exploit? A. hijacking B. botnet C. baiting D. spyware E. zero-day attac

Botnet

The term "exhaustive categories" means that an object being coded can fit into one category but not in a second category. T or F

False

The term "mutually exclusive categories" means that every object being coded can fit into one of the categories. T or F

False

The term self-efficacy means that a person believes a solution will be an effective remedy for a problem True or False

False

Design an experiment to test the mumble attack for effectiveness as a social engineering strategy. Be sure to identify the independent & dependent variables

IV mumble & no mumbledv account information given to the hacker

Research shows that when we concentrate on one stimuli, we are less able to see other stimuli. This is called A. inoculation B. multitasking C. inattentional blindness D. peripheral processing E. cognitive response

Inattentional blindness

Explain why people are still susceptible to phishing attacks - even after they have received cybersecurity training

People are susceptible to fishing attacks because of operant conditioning and inattentional blindness. This happens when the victim receives a phishing email that seems to be made really well until you see that there are typos, spoof email addresses and senses of urgency included in the email, usually when promoting deals or account information in a link. People don't always consider emails to be phishing because sometimes the emails make it past the junk emails and end up in your inbox.

The practice of sending fraudulent emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers is called

Phishing

Ivan Pavlov noticed his dogs salivated when he showed them meat. Pavlov paired the meat with the ringing of a bell. After a time, the dogs would salivate at the sound of a bell. The bell is the A. Previously Conditioned Stimulus B. Unconditioned Stimulus C. Conditioned Stimulus D. conditioned response E. operant conditioning

Conditioned stimulus

A type of malicious software designed to deny access to a computer system or data until they pay to have their access restored

Ransomware

Bob clinks on 50% of the links he gets in his email. A researcher devises a machine that will administer shocks to people if they click on links in their email messages. After training on the new machine, Bob clicks on links about 75% of the time. This means shocking Bob A. punished his clicking behavior B. reinforced his clicking behavior C. neither reinforced or punished his link clicking behavior

Reinforced his clicking behavior

Using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft is called A. vishing B. phishing C. smishing D. pretexting E. phonetics

Vishing


Kaugnay na mga set ng pag-aaral

Prepositions and Phrasal Verbs Practice 1

View Set

Chapter 33 Therapy for asthma, airway inflammation and bronchoconstriction PrepU

View Set

Parts of the Reproductive System

View Set

Chapter 18: Report on Audited F/S

View Set

Technical Drawings and Schematics

View Set

Cell Division and Asexual Reproduction

View Set

2.2.3. Describe the anatomy of the heart with reference to the heart chambers, valves and major blood vessels

View Set