Exam 2: What Is Cybersecurity
Exam 1: Cyberspace, the Internet, and the World Wide Web40 Questions
Exam 2: What Is Cybersecurity40 Questions
Exam 3: Threat Factors Computers As Targets40 Questions
Exam 4: Threats to Cybersecurity by Criminals and Organized Crime40 Questions
Exam 5: Threats to Cybersecurity by Hacktivists and Nation States40 Questions
Exam 6: National Security: Cyberwarfare and Cyberespionage40 Questions
Exam 7: Cyberterrorism39 Questions
Exam 8: An Evolving Threat: the Deep Web40 Questions
Exam 9: Cybersecurity Operations40 Questions
Exam 10: Cyber Security Policies and Legal Issues40 Questions
Exam 11: What the Future Holds40 Questions
Select questions type
According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.
(Multiple Choice)
4.9/5
(40)
Which of the following types of attacks can also happen accidentally?
(Multiple Choice)
4.9/5
(34)
______ allowing individuals to access secured networks without the owners' knowledge is also known as a backdoor.
(Multiple Choice)
4.9/5
(40)
Critical infrastructures include transportation, electrical grid system, and banking systems.
(True/False)
4.7/5
(36)
The creation of ______ has led to the creation of new hacking/fraudster built-in malware techniques that can target users via smartphones and tablets.
(Multiple Choice)
4.8/5
(41)
Submarine Network Policy is used to secure devices at the ______ level.
(Multiple Choice)
4.7/5
(30)
Hacking cars or other means of transportation, such as airplanes, is an example of a security issue seen in which of the following techniques?
(Multiple Choice)
4.9/5
(37)
According to the text, dams, railways, and power plants are considered ______.
(Multiple Choice)
4.9/5
(28)
According to the text, network attacks are attractive because they can go undetected and the perpetrators are difficult to trace.
(True/False)
4.8/5
(36)
Which of the following was NOT identified as a recommendation for increasing automotive cybersecurity?
(Multiple Choice)
4.8/5
(36)
The Computer Security Act was one of the first legislations to advance the protection of federal computers.
(True/False)
4.7/5
(39)
Identify the benefits of wireless technology and the associated risks/vulnerabilities.
(Essay)
4.9/5
(36)
Identify and describe the two main forms of network-based attacks. How are they different? Use examples to differentiate the two.
(Essay)
4.8/5
(40)
The ______ technique targets file-sharing tools, such as Google Drive.
(Multiple Choice)
4.8/5
(32)
Identify the five dominant themes within the cybersecurity conceptualization literature. Which of these do you think is predominant in the conceptualization literature? Why?
(Essay)
4.9/5
(36)
The majority of critical infrastructure in the United States is owned by the public sector.
(True/False)
4.8/5
(42)
The interception of a message by a third party is also referred to as a ______ attack.
(Multiple Choice)
4.8/5
(40)
Describe the cybersecurity gap. Do you agree with the assertion of former Central Intelligence Agency director General Michael Hayden that there is a cybersecurity knowledge gap? Why or why not?
(Essay)
4.9/5
(39)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)