CF Chapter 1- 4

CF Chapter 1- 4

Professional Development

40 Qs

quiz-placeholder

Similar activities

US and TX Constitution Exam

US and TX Constitution Exam

University - Professional Development

40 Qs

Lite Sauce

Lite Sauce

Professional Development

40 Qs

46-90

46-90

Professional Development

45 Qs

LPC - Mar'23-24

LPC - Mar'23-24

Professional Development

42 Qs

152 Level 2 REVISION

152 Level 2 REVISION

Professional Development

37 Qs

DSAC-12 Annex B

DSAC-12 Annex B

Professional Development

42 Qs

Plumbing Level 2 - Central Heating

Plumbing Level 2 - Central Heating

12th Grade - Professional Development

41 Qs

Understanding eContent Development Tools

Understanding eContent Development Tools

Professional Development

35 Qs

CF Chapter 1- 4

CF Chapter 1- 4

Assessment

Quiz

Other

Professional Development

Medium

Created by

sam foon

Used 6+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is an example of an Internet data domain?

Cisco

Juniper

Linkedin

Palo Alto

Answer explanation

Refer to chapter 1 slide 4
A data domain is a repository for data.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

Answer explanation

refer to chapter 1 slide 5
Internet of Everything is the term used for Internet-connected devices

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

algorithm

DDoS

exhaustion

Answer explanation

refer to chapter 1 slide 24
Algorithm attacks can force computers to use memory or overwork the CPU.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

Answer explanation

Refer to chapter 1 slide 13

A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DoS

spoof

DDoS

ping sweep

Answer explanation

Refer to chapter 1 slide 25
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Name 1 types of records that cyber criminals would be interested in stealing from organizations. (multiple answers)

personal, medical

education

employment

financial

Answer explanation

Refer to Chapter 1 - Slides 14 Common Threats - Threat Arenas
The following examples are just a few sources of data that can come from established organizations:
Personal Information
Medical Records
Education Records
Employment and Financial Records

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

changing operating systems

establishing early warning systems

sharing cyber Intelligence information

Answer explanation

Refer to Chapter 1 - Slides 10 Cybersecurity Specialists
Thwarting the cyber criminals is a difficult task and there is no such thing as a “silver bullet.” However, company, government and international organizations have begun to take coordinated actions to limit or fend off cyber criminals. The coordinated actions include:
1) Vulnerability Database
2) Early Warning Systems
3) Share Cyber Intelligence
4) ISM Standards
5) New Laws

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?