Exam 1: Cyberspace, the Internet, and the World Wide Web
Exam 1: Cyberspace, the Internet, and the World Wide Web40 Questions
Exam 2: What Is Cybersecurity40 Questions
Exam 3: Threat Factors Computers As Targets40 Questions
Exam 4: Threats to Cybersecurity by Criminals and Organized Crime40 Questions
Exam 5: Threats to Cybersecurity by Hacktivists and Nation States40 Questions
Exam 6: National Security: Cyberwarfare and Cyberespionage40 Questions
Exam 7: Cyberterrorism39 Questions
Exam 8: An Evolving Threat: the Deep Web40 Questions
Exam 9: Cybersecurity Operations40 Questions
Exam 10: Cyber Security Policies and Legal Issues40 Questions
Exam 11: What the Future Holds40 Questions
Select questions type
Which of the following is comparable to the address you would put on a letter to tell the postal service to deliver a letter to?
(Multiple Choice)
4.9/5
(34)
Internet users generally struggle with identifying when their computer has been attacked. In order to quickly respond to a cyberattack on their system, a user would have to be able to overcome which of the following Internet threats?
(Multiple Choice)
4.8/5
(39)
Development of the ______ resolved issues with hierarchical host names making it easier for the average person to access the Internet.
(Multiple Choice)
4.8/5
(34)
The inventors of the Internet likely didn't consider ______ during its development.
(Multiple Choice)
5.0/5
(35)
Criminals as well as average Internet users are good at hiding their identifying information online.
(True/False)
4.8/5
(36)
According to the text, the Internet was built to be a free and open access tool. Which of the following best represents this concept?
(Multiple Choice)
4.9/5
(31)
Identify and describe the four layers of cyberspace. How do each of these contribute to the way people communicate with each other?
(Essay)
4.8/5
(41)
The opportunity to create new businesses and markets online best describes which aspect of Internet development?
(Multiple Choice)
4.8/5
(43)
It is possible to determine what a specific code will do from the code of 1s and 0s.
(True/False)
4.8/5
(39)
Countries concerned with controlling the flow of information and goods online would be most concerned with which of the following aspects of the Internet?
(Multiple Choice)
4.9/5
(38)
The Internet is built out of components that provide servicers for users, such as social media, content, shopping, etc.
(True/False)
4.9/5
(37)
Which of the Internet gateways to vulnerability can be described as the computer code of the Internet?
(Multiple Choice)
4.9/5
(37)
Identify and describe the five gateways to vulnerabilities for anyone who uses the Internet. Which of these do you think poses the greatest risk to Internet security? Justify your response by providing specific examples and comparing the threat to at least one other vulnerability.
(Essay)
4.9/5
(35)
______ is a reference or navigation element in a hypertext document that offers direct access to another section of the same document or to another hypertext document that is on or part of a (different) domain.
(Multiple Choice)
4.9/5
(41)
Hyperlinks have two main components: the protocol identifier and the resource name.
(True/False)
4.9/5
(36)
The Internet was originally built to be a free and open source, with minimal oversight.
(True/False)
4.9/5
(36)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)