Exam 2: What Is Cybersecurity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.

(Multiple Choice)
4.9/5
(40)

Which of the following types of attacks can also happen accidentally?

(Multiple Choice)
4.9/5
(34)

Explain the difficulties in defining cybersecurity.

(Essay)
4.7/5
(49)

______ allowing individuals to access secured networks without the owners' knowledge is also known as a backdoor.

(Multiple Choice)
4.9/5
(40)

Malware is readily available for purchase and/or download.

(True/False)
4.9/5
(37)

Critical infrastructures include transportation, electrical grid system, and banking systems.

(True/False)
4.7/5
(36)

The creation of ______ has led to the creation of new hacking/fraudster built-in malware techniques that can target users via smartphones and tablets.

(Multiple Choice)
4.8/5
(41)

Submarine Network Policy is used to secure devices at the ______ level.

(Multiple Choice)
4.7/5
(30)

Hacking cars or other means of transportation, such as airplanes, is an example of a security issue seen in which of the following techniques?

(Multiple Choice)
4.9/5
(37)

According to the text, dams, railways, and power plants are considered ______.

(Multiple Choice)
4.9/5
(28)

According to the text, network attacks are attractive because they can go undetected and the perpetrators are difficult to trace.

(True/False)
4.8/5
(36)

Which of the following was NOT identified as a recommendation for increasing automotive cybersecurity?

(Multiple Choice)
4.8/5
(36)

The Computer Security Act was one of the first legislations to advance the protection of federal computers.

(True/False)
4.7/5
(39)

Identify the benefits of wireless technology and the associated risks/vulnerabilities.

(Essay)
4.9/5
(36)

Identify and describe the two main forms of network-based attacks. How are they different? Use examples to differentiate the two.

(Essay)
4.8/5
(40)

The ______ technique targets file-sharing tools, such as Google Drive.

(Multiple Choice)
4.8/5
(32)

Identify the five dominant themes within the cybersecurity conceptualization literature. Which of these do you think is predominant in the conceptualization literature? Why?

(Essay)
4.9/5
(36)

The majority of critical infrastructure in the United States is owned by the public sector.

(True/False)
4.8/5
(42)

The interception of a message by a third party is also referred to as a ______ attack.

(Multiple Choice)
4.8/5
(40)

Describe the cybersecurity gap. Do you agree with the assertion of former Central Intelligence Agency director General Michael Hayden that there is a cybersecurity knowledge gap? Why or why not?

(Essay)
4.9/5
(39)
Showing 21 - 40 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)