Exam 2: What Is Cybersecurity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

______ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.

Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
Verified

A

The ______ technique, also referred to as a banking Trojan, operates in the background of the computer by modifying banking transactions.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

C

Work-for-hire hackers who work for private security corporations are also referred to as ______.

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

C

Making mistakes that can lead to security vulnerabilities is also referred to as ______.

(Multiple Choice)
4.7/5
(41)

White hat hackers work for private corporations to expose vulnerabilities in their security systems.

(True/False)
4.8/5
(43)

The ______ is responsible for collecting and decrypting threats both physical and cyber via the use of Signal Intelligence.

(Multiple Choice)
4.9/5
(42)

All of the following are considered public sector entities except ______.

(Multiple Choice)
4.9/5
(41)

The ______ Computer Emergency Response Team (CERT) investigated the cyber intrusion that became known as Moonlight Maze.

(Multiple Choice)
4.7/5
(50)

The aftermath of 9/11 led to an increase in cybersecurity strategies.

(True/False)
4.7/5
(36)

In 1987, the ______ strengthened the security measures for online systems.

(Multiple Choice)
4.9/5
(38)

______ occur when a computer system is accessed without permission.

(Multiple Choice)
4.7/5
(38)

In 1988, the Defense Advances Research Projects Agency (DARPA) created the ______ with the goal of striving for a safer and stronger Internet for all Americans.

(Multiple Choice)
4.8/5
(42)

Defining cybersecurity is not an issue in the academe.

(True/False)
4.7/5
(39)

According to the text, preparing for a cyberattack was a top priority for national security in the late 1980s.

(True/False)
4.8/5
(39)

Which of the following themes within the cybersecurity conceptualization literature was NOT identified by Craigen and his team?

(Multiple Choice)
4.7/5
(36)

______ is a bacterial disease, weaponized in powder form, which was sent to various television studios and congressional offices via mail in the early 2000s.

(Multiple Choice)
4.8/5
(43)

The National Cybersecurity and Communications Integration Center works alone in reducing the probability and the damage caused by cyberattacks.

(True/False)
5.0/5
(37)

The ______ technique targets devices that can be connected, such as car alarms, thermostats, etc.

(Multiple Choice)
4.8/5
(33)

The role of the ______ was extended in the Cybersecurity Enhancement Act of 2014.

(Multiple Choice)
4.9/5
(40)

______ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.

(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)