What is cybersecurity?

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Alice is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Bob gets on the computer after her, and he sees her grades for all of her classes. Which part of the CIA triad was broken?

Confidentiality

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email?

Knowing a recent store that you shopped at

What does a ransomware hacker do when they gain access to a user's system?

Encrypt important files

What should be the primary focus of keeping information secure?

Ensuring the confidentiality, integrity, and availability of data

True or False: Learning computer science or coding is only useful if you want to become a professional programmer.

False

What is the main fear that ransomware attacks center around?

Fear of losing important files

Which of the following is not true about cybersecurity?

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

Which of the following is true about jobs in the field of cybersecurity?

There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.

A deceptive email is typically used in a phishing attack. Which of the following is most likely a legitimate email address?

[email protected]

What is the core technology that allows digital devices to connect and transmit data with each other?

networks

What is comprised of millions of smart devices and sensors connected to the internet?

the internet of things

Which of the following devices is not a part of the Internet of Things?

A physical combination padlock for your gym locker

Which kind of personal information do people send over the Internet?

All of the above

Which of the following is true of the WannaCry ransomware attack?

All of the above are true

Which of the following devices is not connected to the Internet of Things?

An AM/FM radio without any bluetooth or Internet connection capabilities

Robert is on an online auction site trying to make a bid on a new computer. As he tries to make a bid, the site crashes and he loses the auction. Which part of the CIA triad was broken?

Availability

Which of the following statements are true? A. There has been a decrease in the number of cyber attacks in the past decade. B. Cybersecurity is the protection of computer systems, networks, and data from digital attacks. C. Cyber attacks in the past few years have impacted individuals, governments, and organizations.

B and C

Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary. Which part of the CIA triad was broken?

Confidentiality

In cybersecurity, what does CIA stand for?

Confidentiality, Integrity, Availability

Which of the following is true about the Internet of Things? I. - The Internet of Things is the network of devices with the ability to connect and exchange data. II - The Internet of Things increases our vulnerability to cyber attacks. III - The Internet of Things is purely positive-there are no negative consequences to increased connectivity

I and II

Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken?

Integrity

Cynthia discovers that she has the ability to modify the lunch menu posted on her school's website. She edits the website so for lunch every day, it says "Green Eggs and Ham". Which part of the CIA triad was broken?

Integrity

In 2016, online fraud cases in the United States resulted in victim losses totaling:

Over $1.2 billion

Which of the following most accurately describes the Internet of Things?

The network of devices with the ability to connect and exchange data.


संबंधित स्टडी सेट्स

Honan-Chapter 26: Nursing Assessment: Renal and Urinary Tract Function

View Set

Chapter 1: The Individual Tax Return

View Set

STRA 5370 - Chapter 7: Vertical Integration and Outsourcing Quiz

View Set