cyber security chapter 1 quiz
The individual user profile on a social network site is an example of a/an _________________ identity.
online
What is another name for confidentiality of information?
privacy
Which method is used to check the integrity of data?
checksum
What three items are components of the CIA triad? (Choose three.)
confidentiality integrity availability
What is the motivation of a white hat attacker?
discovering weaknesses of networks and systems to improve the security level of these systems
What is an example of "hacktivism"?
A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.
What is a reason that internal security threats might cause greater damage to an organization than external security threats?
Internal users have direct access to the infrastructure devices.
Which statement describes cyber warfare?
It is Internet-based conflict that involves the penetration of information systems of other nations.
make political statements in order to create an awareness of issues that are important to them
hacktivists
gather intelligence or commit sabotage on specific goals on behalf of their government
state-sponsored attackers
make political statements, or create fear, by causing physical or psychological damage to victims
terrorists
What are three methods that can be used to ensure confidentiality of information? (Choose three.)
two factor authentication data encryption username ID and password