Last Updated on October 29, 2019 by Admin
Cybersecurity Essentials 1.1 Chapter 1 Quiz Online
CE -- Chapter 1 Quiz
Quiz-summary
0 of 11 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
Information
CE — Chapter 1 Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 11 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- Answered
- Review
-
Question 1 of 11
1. Question
2 pointsThwarting cyber criminals includes which of the following? (Choose two.)Correct
Incorrect
Organization can join efforts to thwart cyber crime by establishing early warning systems and sharing cyber intelligence.
Hint
Organization can join efforts to thwart cyber crime by establishing early warning systems and sharing cyber intelligence.
-
Question 2 of 11
2. Question
1 pointsWhat does the acronym IoE represent?Correct
Incorrect
Internet of Everything is the term used for Internet-connected devices
Hint
Internet of Everything is the term used for Internet-connected devices
-
Question 3 of 11
3. Question
1 pointsWhat name is given to a amateur hacker?Correct
Incorrect
Script kiddies is a term used to describe inexperienced hackers.
Hint
Script kiddies is a term used to describe inexperienced hackers.
-
Question 4 of 11
4. Question
3 pointsPick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)Correct
Incorrect
Employment, medical, and education records are important to protect because they contain personal information.
Hint
Employment, medical, and education records are important to protect because they contain personal information.
-
Question 5 of 11
5. Question
1 pointsWhat is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?Correct
Incorrect
The “Analyze” category of the workforce framework includes specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness.
Hint
The “Analyze” category of the workforce framework includes specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness.
-
Question 6 of 11
6. Question
1 pointsWhat name is given to hackers who hack for a cause?Correct
Incorrect
The term is used to describe gray hackers who rally and protect for a cause.
Hint
The term is used to describe gray hackers who rally and protect for a cause.
-
Question 7 of 11
7. Question
1 pointsWhat does the term BYOD represent?Correct
Incorrect
The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,
Hint
The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,
-
Question 8 of 11
8. Question
1 pointsWhat does the term vulnerability mean?Correct
Incorrect
A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.
Hint
A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.
-
Question 9 of 11
9. Question
1 pointsWhat type of attack uses many systems to flood the resources of a target, thus making the target unavailable?Correct
Incorrect
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
Hint
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
-
Question 10 of 11
10. Question
1 pointsWhat is an example of an Internet data domain?Correct
Incorrect
A data domain is a repository for data.
Hint
A data domain is a repository for data.
-
Question 11 of 11
11. Question
1 pointsWhat type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?Correct
Incorrect
Algorithm attacks can force computers to use memory or overwork the CPU.
Hint
Algorithm attacks can force computers to use memory or overwork the CPU.