Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Instructions
This quiz covers the content in Cybersecurity Essentials 1.1 Chapter 1. It is designed to provide an additional
opportunity to practice the skills and knowledge presented in the chapter and to help prepare for the final quiz. You
will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can also be
deducted for answering incorrectly.
Form 32909
Attempt History
Attempt Time Score
LATEST Attempt 1 4 minutes 22 out of 22
Question 1 2 / 2 pts
Correct!
bring your own device
black hat
red hat
Correct!
script kiddie
blue team
Question 3 2 / 2 pts
white hat
hacker
Correct!
hactivist
blue hat
Question 4 2 / 2 pts
What is the workforce framework category that includes highly specialized review
and evaluation of incoming cybersecurity information to determine if it is useful for
intelligence?
Protect and Defend
Securely Provision
Correct!
Analyze
Question 5 2 / 2 pts
Correct!
a weakness that makes a target susceptible to an attack
Question 6 2 / 2 pts
hiring hackers
changing operating systems
Question 7 2 / 2 pts
Pick three types of records that cyber criminals would be interested in stealing from
organizations. (Choose three.)
Correct! employment
food
Correct! education
rock
game
Correct! medical
flight
Question 8 2 / 2 pts
Palo Alto
Juniper
Correct!
Linkedin
Question 9 2 / 2 pts
Internet of Everyday
Correct!
Internet of Everything
Intelligence on Everything
Question 10 2 / 2 pts
What type of attack uses many systems to flood the resources of a target, thus
making the target unavailable?
Correct!
DDoS
spoof
ping sweep
DoS
Question 11 2 / 2 pts
DDoS
Correct!
algorithm
APT
exhaustion