Exam 2: What Is Cybersecurity
Exam 1: Cyberspace, the Internet, and the World Wide Web40 Questions
Exam 2: What Is Cybersecurity40 Questions
Exam 3: Threat Factors Computers As Targets40 Questions
Exam 4: Threats to Cybersecurity by Criminals and Organized Crime40 Questions
Exam 5: Threats to Cybersecurity by Hacktivists and Nation States40 Questions
Exam 6: National Security: Cyberwarfare and Cyberespionage40 Questions
Exam 7: Cyberterrorism39 Questions
Exam 8: An Evolving Threat: the Deep Web40 Questions
Exam 9: Cybersecurity Operations40 Questions
Exam 10: Cyber Security Policies and Legal Issues40 Questions
Exam 11: What the Future Holds40 Questions
Select questions type
______ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.
Free
(Multiple Choice)
5.0/5
(38)
Correct Answer:
A
The ______ technique, also referred to as a banking Trojan, operates in the background of the computer by modifying banking transactions.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
C
Work-for-hire hackers who work for private security corporations are also referred to as ______.
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
C
Making mistakes that can lead to security vulnerabilities is also referred to as ______.
(Multiple Choice)
4.7/5
(41)
White hat hackers work for private corporations to expose vulnerabilities in their security systems.
(True/False)
4.8/5
(43)
The ______ is responsible for collecting and decrypting threats both physical and cyber via the use of Signal Intelligence.
(Multiple Choice)
4.9/5
(42)
All of the following are considered public sector entities except ______.
(Multiple Choice)
4.9/5
(41)
The ______ Computer Emergency Response Team (CERT) investigated the cyber intrusion that became known as Moonlight Maze.
(Multiple Choice)
4.7/5
(50)
The aftermath of 9/11 led to an increase in cybersecurity strategies.
(True/False)
4.7/5
(36)
In 1987, the ______ strengthened the security measures for online systems.
(Multiple Choice)
4.9/5
(38)
______ occur when a computer system is accessed without permission.
(Multiple Choice)
4.7/5
(38)
In 1988, the Defense Advances Research Projects Agency (DARPA) created the ______ with the goal of striving for a safer and stronger Internet for all Americans.
(Multiple Choice)
4.8/5
(42)
According to the text, preparing for a cyberattack was a top priority for national security in the late 1980s.
(True/False)
4.8/5
(39)
Which of the following themes within the cybersecurity conceptualization literature was NOT identified by Craigen and his team?
(Multiple Choice)
4.7/5
(36)
______ is a bacterial disease, weaponized in powder form, which was sent to various television studios and congressional offices via mail in the early 2000s.
(Multiple Choice)
4.8/5
(43)
The National Cybersecurity and Communications Integration Center works alone in reducing the probability and the damage caused by cyberattacks.
(True/False)
5.0/5
(37)
The ______ technique targets devices that can be connected, such as car alarms, thermostats, etc.
(Multiple Choice)
4.8/5
(33)
The role of the ______ was extended in the Cybersecurity Enhancement Act of 2014.
(Multiple Choice)
4.9/5
(40)
______ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)