Module 1 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An individual user profile on a social network site is an example of an ________ identity.

online

Which of the following pieces of information would be classified as personal data?Select three correct answers 1.Social security number 2.Driver license number 3.Date and place of birth 4.Job title 5.IP address

1, 2 & 3

Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. What level of cyber protection does each of the following factors require?

Your online identity Answer: Personal A customer database Answer: Organizational Economic stabilty Answer: Government

What are the foundational principles for protecting information systems as outlined in the McCumber Cube? Choose three correct answers 1.Access 2.Integrity 3.Scalability 4.Availability 5.Confidentiality 6.Intervention

2, 4 & 5

Which of the following methods can be used to ensure confidentiality of information? Choose three correct answers 1.Backup 2.Version control 3.Data encryption 4.File permission settings 5.Two-factor authentication 6.Username ID and password

3,5 & 6

Which of the statements correctly describes cybersecurity? A.Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks B.Cybersecurity is the ongoing effort to protect individuals, organizations and governments from crimes that happen only in cyberspace C.Cybersecurity is the ongoing effort to protect computers, networks and data from malicious attacks

A

Stuxnet malware was designed for which primary purpose? A. To hijack and take control of targeted computers B. To cause physical damage to equipment controlled by computers C. To cause serious harm to workers in a nuclear enrichment plant

B

Why might internal security threats cause greater damage to an organization than external security threats? A.Internal users have better hacking skills B.Internal users have direct access to the infrastructure devices C.Internal users can access the organizational data without authentication D.Internal users can access the infrastructure devices through the Internet

B

Which of the following is a key motivation of a white hat attacker? A. Taking advantage of any vulnerability for illegal personal gain B. Fine tuning network devices to improve their performance and efficiency C. Studying operating systems of various platforms to develop a new system D. Discovering weaknesses of networks and systems to improve the security level of these systems

D

Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

No


Ensembles d'études connexes

Statics 1401- Final Exam-Chapters 1-11

View Set

Chapter 15: Intracellular Compartments and Protein Transport

View Set

Ch 36 inflammatory disorders, Valvular disorders

View Set

Intro to Auto Ch. 20,21,23,24,25 Test

View Set

NCLEX Review: Fluid, Electrolyte and Acid-Base Imbalances

View Set

2.5-Integumentary System Saunders Review Questions

View Set

Personal Finance End-Of-Year Test

View Set