Sei sulla pagina 1di 6

Chapter 1 Quiz

Due No due date Points 22 Questions 11 Time Limit None


Allowed Attempts Unlimited

Instructions
This quiz covers the content in Cybersecurity Essentials 1.1 Chapter 1. It is designed to provide an additional
opportunity to practice the skills and knowledge presented in the chapter and to help prepare for the final quiz. You
will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can also be
deducted for answering incorrectly.

Form 32909

Take the Quiz Again

Attempt History
Attempt Time Score
LATEST Attempt 1 4 minutes 22 out of 22

Submitted Jun 25 at 7pm

Question 1 2 / 2 pts

What does the term BYOD represent?

bring your own disaster

bring your own decision

buy your own disaster

Correct!
bring your own device

Refer to curriculum topic: 1.4.1


The term bring-your-own-device is used to describe mobile devices such as
iPhones, smartphones, tablets, and other devices,
Question 2 2 / 2 pts

What name is given to a amateur hacker?

black hat

red hat

Correct!
script kiddie

blue team

Refer to curriculum topic: 1.2.1


Script kiddies is a term used to describe inexperienced hackers.

Question 3 2 / 2 pts

What name is given to hackers who hack for a cause?

white hat

hacker

Correct!
hactivist

blue hat

Refer to curriculum topic: 1.2.1


The term is used to describe gray hackers who rally and protect for a cause.

Question 4 2 / 2 pts

What is the workforce framework category that includes highly specialized review
and evaluation of incoming cybersecurity information to determine if it is useful for
intelligence?
Protect and Defend

Securely Provision

Correct!
Analyze

Oversight and Development

Refer to curriculum topic: 1.5.1


The "Analyze" category of the workforce framework includes specialty areas
responsible for highly specialized review and evaluation of incoming
cybersecurity information to determine its usefulness.

Question 5 2 / 2 pts

What does the term vulnerability mean?

a method of attack to exploit a target

a computer that contains sensitive information

Correct!
a weakness that makes a target susceptible to an attack

a potential threat that a hacker creates

a known target or victim machine

Refer to curriculum topic: 1.3.1


A vulnerability is not a threat, but it is a weakness that makes the PC or the
software a target for attacks.

Question 6 2 / 2 pts

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers
changing operating systems

Correct!  establishing early warning systems

shutting down the network

Correct!  sharing cyber Intelligence information

Refer to curriculum topic: 1.2.2


Organization can join efforts to thwart cyber crime by establishing early
warning systems and sharing cyber intelligence.

Question 7 2 / 2 pts

Pick three types of records that cyber criminals would be interested in stealing from
organizations. (Choose three.)

Correct!  employment

food

Correct!  education

rock

game

Correct!  medical

flight

Refer to curriculum topic: 1.3.1


Employment, medical, and education records are important to protect
because they contain personal information.

Question 8 2 / 2 pts

What is an example of an Internet data domain?


Cisco

Palo Alto

Juniper

Correct!
Linkedin

Refer to curriculum topic: 1.1.1


A data domain is a repository for data.

Question 9 2 / 2 pts

What does the acronym IoE represent?

Insight into Everything

Internet of Everyday

Correct!
Internet of Everything

Intelligence on Everything

Refer to curriculum topic: 1.1.1


Internet of Everything is the term used for Internet-connected devices

Question 10 2 / 2 pts

What type of attack uses many systems to flood the resources of a target, thus
making the target unavailable?

Correct!
DDoS

spoof

ping sweep
DoS

Refer to curriculum topic: 1.4.2


DDoS is is an attack that involves multiple systems. DoS involves only a
single attack system.

Question 11 2 / 2 pts

What type of an attack can disable a computer by forcing it to use memory or by


overworking its CPU?

DDoS

Correct!
algorithm

APT

exhaustion

Refer to curriculum topic: 1.4.2


Algorithm attacks can force computers to use memory or overwork the CPU.

Potrebbero piacerti anche