Cyber test questions
Identify the principle from the Health Belief Model that best corresponds with the statement "7% of the individuals victimized by identify theft reported feeling suicidal." A. susceptibility B. severity C. cues to action D. self-efficacy E. barriers
Severity
Psychological manipulation of people into performing actions or divulging confidential information - also known as a con or fraud scheme is a definition of A. computer crime B. social engineering C. persuasion D. coercion
Social engineering
Why would a researcher use a random sample when conducting a study?
To describe the population
Cookies are text files with small pieces of data — like a username and password — that are used to identify your computer as you use a computer network. True or False
True
Cyber-mindful training moves people from peripheral processing to central processing or carelessness to mindfulness. True or False
True
In the classical conditioning explanation of cell phone addiction or attraction, once the cellphone is associated with dopamine production (feeling good), people become anxious even their phones are not available. True or False
True
Operant conditioning suggests that people become conditioned to click on links because when they have clicked on links in the past their behavior was reinforced. True or False
True
Research on fear appeals suggests people are only motivated to change their behavior if they feel efficacious. True or False
True
Researchers adapting the health belief model to use in the realm of cybersecurity is an example of intension. True or False
True
The research by Ellen Langer (Xerox Machine Study) suggests that the size of the request influences how people process information. True or False
True
The research by Ellen Langer (Xerox Machine Study) suggests that when people are making decisions they use heuristics like the word because so they do not have to carefully process the information. True or False
True
The term bounded rationality means that people behave in ways that are consistent with their goals but they are limited or restricted by the information they have and their ability to process that information. True or False
True
The term cognitive response refers to those thoughts we have when we are exposed to information or messages of others. True or False
True
The term punishment means decrease the rate, likelihood or probability of a target behavior occurring. True or False
True
The term rationality refers to people behaving in ways that are consistent with their goals. True or False
True
The term reinforcement means increase the rate, likelihood or probability of a target behavior occurring. True or False
True
The term self-efficacy means that a person believes they can be successful at performing a particular behavior True or False
True
There is evidence that our thoughts or cognitive responses may impact our attitudes more than the actual message that prompted the cognitive response. True or False
True
Using fear to motivate cyber-security behavior increases the risk of making people cyber-fatigued. True or False
True
Ivan Pavlov noticed his dogs salivated when he showed them meat. Pavlov paired the meat with the ringing of a bell. After a time, the dogs would salivate at the sound of a bell. The meat is the A. Conditioned Stimulus B. Unconditioned Stimulus C. Unconditioned Response D. Previously Conditioned Stimulus
Unconditioned Stimulus
Identify the principle from the Health Belief Model that best corresponds with the statement "15 million consumers experienced identity theft in 2020."
susceptibility
What are the three requirements for establishing causality?
the three requirements for establishing causality are time order, covariation and rule out alternative explanations.
Why would a researcher use a non-random or a nonprobability sample in a study?
they would use a non-random sample if no sampling frame exists
The statement females are less susceptible to phishing attacks than males is an example of A. a null hypothesis B. an active directional hypothesis (one tailed) C. an active non-directional hypothesis (two tailed) D. a research question
An active directional hypothesis (one tailed)
Identify the principle from the Health Belief Model that best corresponds with the statement "it is more difficult to remember unique passwords for all of your accounts than it is to rely on a single password." A. susceptibility B. severity C. barriers D. benefits E. cues to action
Barriers
Identify the principle from the Health Belief Model that best corresponds with the statement "maintaining a unique password for all of your accounts reduces the risk of identity theft by 50%." A. severity B. barrier C. cues to action D. benefit E. susceptibility
Benefit
Dropping malware infected USB drives is an example of which type of exploit? A. hijacking B. botnet C. baiting D. spyware E. zero-day attac
Botnet
The term "exhaustive categories" means that an object being coded can fit into one category but not in a second category. T or F
False
The term "mutually exclusive categories" means that every object being coded can fit into one of the categories. T or F
False
The term self-efficacy means that a person believes a solution will be an effective remedy for a problem True or False
False
Design an experiment to test the mumble attack for effectiveness as a social engineering strategy. Be sure to identify the independent & dependent variables
IV mumble & no mumbledv account information given to the hacker
Research shows that when we concentrate on one stimuli, we are less able to see other stimuli. This is called A. inoculation B. multitasking C. inattentional blindness D. peripheral processing E. cognitive response
Inattentional blindness
Explain why people are still susceptible to phishing attacks - even after they have received cybersecurity training
People are susceptible to fishing attacks because of operant conditioning and inattentional blindness. This happens when the victim receives a phishing email that seems to be made really well until you see that there are typos, spoof email addresses and senses of urgency included in the email, usually when promoting deals or account information in a link. People don't always consider emails to be phishing because sometimes the emails make it past the junk emails and end up in your inbox.
The practice of sending fraudulent emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers is called
Phishing
Ivan Pavlov noticed his dogs salivated when he showed them meat. Pavlov paired the meat with the ringing of a bell. After a time, the dogs would salivate at the sound of a bell. The bell is the A. Previously Conditioned Stimulus B. Unconditioned Stimulus C. Conditioned Stimulus D. conditioned response E. operant conditioning
Conditioned stimulus
A type of malicious software designed to deny access to a computer system or data until they pay to have their access restored
Ransomware
Bob clinks on 50% of the links he gets in his email. A researcher devises a machine that will administer shocks to people if they click on links in their email messages. After training on the new machine, Bob clicks on links about 75% of the time. This means shocking Bob A. punished his clicking behavior B. reinforced his clicking behavior C. neither reinforced or punished his link clicking behavior
Reinforced his clicking behavior
Using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft is called A. vishing B. phishing C. smishing D. pretexting E. phonetics
Vishing