Deck 2: What Is Cybersecurity

Full screen (f)
exit full mode
Question
Submarine Network Policy is used to secure devices at the ______ level.

A) local
B) state
C) federal
D) corporate
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following themes within the cybersecurity conceptualization literature was NOT identified by Craigen and his team?

A) events
B) human engagement
C) funding
D) technological solutions
Question
The interception of a message by a third party is also referred to as a ______ attack.

A) phishing
B) human error
C) noisy neighbor
D) man-in-the-middle
Question
The ______ Computer Emergency Response Team (CERT) investigated the cyber intrusion that became known as Moonlight Maze.

A) Navy's
B) Marines'
C) Army's
D) Air Force's
Question
______ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.

A) Titan Rain
B) Moonlight Maze
C) Solar Sunrise
D) GhostNet
Question
Which of the following was NOT identified as a recommendation for increasing automotive cybersecurity?

A) third-party testing
B) aesthetic design
C) internal monitoring systems
D) segmented architecture
Question
Work-for-hire hackers who work for private security corporations are also referred to as ______.

A) blue teams
B) black teams
C) red teams
D) green teams
Question
In 1988, the Defense Advances Research Projects Agency (DARPA) created the ______ with the goal of striving for a safer and stronger Internet for all Americans.

A) Computer Emergency Readiness Team
B) North American Aerospace Defense Command
C) National Security Agency
D) Advanced Research Projects Agency Network
Question
All of the following are considered public sector entities except ______.

A) NSA
B) CIA
C) FusionX
D) DHS
Question
In 1987, the ______ strengthened the security measures for online systems.

A) Federal Computer Systems Protection Act
B) Computer Security Act
C) Homeland Security Act
D) Cybersecurity Enhancement Act
Question
According to the text, dams, railways, and power plants are considered ______.

A) businesses
B) infrastructures
C) governments
D) organizations
Question
______ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.

A) Phishing
B) Distributed denial of service
C) Malware
D) Keylogging
Question
The role of the ______ was extended in the Cybersecurity Enhancement Act of 2014.

A) Secretary of Labor
B) Secretary of Treasury
C) Secretary of State
D) Secretary of Commerce
Question
The ______ is responsible for collecting and decrypting threats both physical and cyber via the use of Signal Intelligence.

A) Central Intelligence Agency
B) Federal Bureau of Investigation
C) National Security Agency
D) Department of Homeland Security
Question
______ is a bacterial disease, weaponized in powder form, which was sent to various television studios and congressional offices via mail in the early 2000s.

A) Botulism
B) Anthrax
C) Cholera
D) Ebola
Question
According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.

A) youthful generation and older generation
B) men and women
C) individuals of different ethnicities
D) private- and public-sector employees
Question
______ allowing individuals to access secured networks without the owners' knowledge is also known as a backdoor.

A) Noisy neighbors
B) Phishing attacks
C) Rogue access points
D) Man-in-the-middle attacks
Question
Hacking cars or other means of transportation, such as airplanes, is an example of a security issue seen in which of the following techniques?

A) Man in the Cloud
B) Man in the Internet of Things
C) Man in the App
D) Man in the Browser
Question
______ occur when a computer system is accessed without permission.

A) Distributed denial of services
B) Rogue access points
C) Micro-segments
D) Network intrusions
Question
Which of the following types of attacks can also happen accidentally?

A) phishing
B) man-in-the-middle
C) malware
D) noisy neighbors
Question
Making mistakes that can lead to security vulnerabilities is also referred to as ______.

A) malicious intent
B) human error
C) interference
D) espionage
Question
Identify the five dominant themes within the cybersecurity conceptualization literature. Which of these do you think is predominant in the conceptualization literature? Why?
Question
Malware is readily available for purchase and/or download.
Question
The Computer Security Act was one of the first legislations to advance the protection of federal computers.
Question
According to the text, preparing for a cyberattack was a top priority for national security in the late 1980s.
Question
The creation of ______ has led to the creation of new hacking/fraudster built-in malware techniques that can target users via smartphones and tablets.

A) file sharing tools
B) messaging tools
C) apps
D) social media
Question
White hat hackers work for private corporations to expose vulnerabilities in their security systems.
Question
The aftermath of 9/11 led to an increase in cybersecurity strategies.
Question
Defining cybersecurity is not an issue in the academe.
Question
Critical infrastructures include transportation, electrical grid system, and banking systems.
Question
The ______ technique, also referred to as a banking Trojan, operates in the background of the computer by modifying banking transactions.

A) man-in-the-middle
B) WiFi eavesdropping
C) man-in-the-browser
D) man-in-the-cloud
Question
According to the text, network attacks are attractive because they can go undetected and the perpetrators are difficult to trace.
Question
Identify and describe the two main forms of network-based attacks. How are they different? Use examples to differentiate the two.
Question
The ______ technique targets file-sharing tools, such as Google Drive.

A) man-in-the-middle
B) man-in-the-cloud
C) man-in-the-browser
D) WiFi eavesdropping
Question
The National Cybersecurity and Communications Integration Center works alone in reducing the probability and the damage caused by cyberattacks.
Question
Explain the difficulties in defining cybersecurity.
Question
Identify the benefits of wireless technology and the associated risks/vulnerabilities.
Question
Describe the cybersecurity gap. Do you agree with the assertion of former Central Intelligence Agency director General Michael Hayden that there is a cybersecurity knowledge gap? Why or why not?
Question
The ______ technique targets devices that can be connected, such as car alarms, thermostats, etc.

A) man-in-the-IoT
B) man-in-the-cloud
C) man-in-the-browser
D) WiFi eavesdropping
Question
The majority of critical infrastructure in the United States is owned by the public sector.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: What Is Cybersecurity
1
Submarine Network Policy is used to secure devices at the ______ level.

A) local
B) state
C) federal
D) corporate
D
2
Which of the following themes within the cybersecurity conceptualization literature was NOT identified by Craigen and his team?

A) events
B) human engagement
C) funding
D) technological solutions
C
3
The interception of a message by a third party is also referred to as a ______ attack.

A) phishing
B) human error
C) noisy neighbor
D) man-in-the-middle
D
4
The ______ Computer Emergency Response Team (CERT) investigated the cyber intrusion that became known as Moonlight Maze.

A) Navy's
B) Marines'
C) Army's
D) Air Force's
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
______ became notorious for being the one of the first cybersecurity intrusions to illustrate how vulnerable our technology is to malicious infiltration.

A) Titan Rain
B) Moonlight Maze
C) Solar Sunrise
D) GhostNet
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following was NOT identified as a recommendation for increasing automotive cybersecurity?

A) third-party testing
B) aesthetic design
C) internal monitoring systems
D) segmented architecture
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Work-for-hire hackers who work for private security corporations are also referred to as ______.

A) blue teams
B) black teams
C) red teams
D) green teams
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
In 1988, the Defense Advances Research Projects Agency (DARPA) created the ______ with the goal of striving for a safer and stronger Internet for all Americans.

A) Computer Emergency Readiness Team
B) North American Aerospace Defense Command
C) National Security Agency
D) Advanced Research Projects Agency Network
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
All of the following are considered public sector entities except ______.

A) NSA
B) CIA
C) FusionX
D) DHS
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
In 1987, the ______ strengthened the security measures for online systems.

A) Federal Computer Systems Protection Act
B) Computer Security Act
C) Homeland Security Act
D) Cybersecurity Enhancement Act
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
According to the text, dams, railways, and power plants are considered ______.

A) businesses
B) infrastructures
C) governments
D) organizations
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
______ refers to attacks where a mass email is sent to multiple computers, requesting personal information be sent to a specific location.

A) Phishing
B) Distributed denial of service
C) Malware
D) Keylogging
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
The role of the ______ was extended in the Cybersecurity Enhancement Act of 2014.

A) Secretary of Labor
B) Secretary of Treasury
C) Secretary of State
D) Secretary of Commerce
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
The ______ is responsible for collecting and decrypting threats both physical and cyber via the use of Signal Intelligence.

A) Central Intelligence Agency
B) Federal Bureau of Investigation
C) National Security Agency
D) Department of Homeland Security
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
______ is a bacterial disease, weaponized in powder form, which was sent to various television studios and congressional offices via mail in the early 2000s.

A) Botulism
B) Anthrax
C) Cholera
D) Ebola
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
According to General Michael Hayden, a cybersecurity knowledge gap exists between ______.

A) youthful generation and older generation
B) men and women
C) individuals of different ethnicities
D) private- and public-sector employees
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
______ allowing individuals to access secured networks without the owners' knowledge is also known as a backdoor.

A) Noisy neighbors
B) Phishing attacks
C) Rogue access points
D) Man-in-the-middle attacks
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Hacking cars or other means of transportation, such as airplanes, is an example of a security issue seen in which of the following techniques?

A) Man in the Cloud
B) Man in the Internet of Things
C) Man in the App
D) Man in the Browser
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
______ occur when a computer system is accessed without permission.

A) Distributed denial of services
B) Rogue access points
C) Micro-segments
D) Network intrusions
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following types of attacks can also happen accidentally?

A) phishing
B) man-in-the-middle
C) malware
D) noisy neighbors
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Making mistakes that can lead to security vulnerabilities is also referred to as ______.

A) malicious intent
B) human error
C) interference
D) espionage
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Identify the five dominant themes within the cybersecurity conceptualization literature. Which of these do you think is predominant in the conceptualization literature? Why?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
Malware is readily available for purchase and/or download.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
The Computer Security Act was one of the first legislations to advance the protection of federal computers.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
According to the text, preparing for a cyberattack was a top priority for national security in the late 1980s.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
The creation of ______ has led to the creation of new hacking/fraudster built-in malware techniques that can target users via smartphones and tablets.

A) file sharing tools
B) messaging tools
C) apps
D) social media
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
White hat hackers work for private corporations to expose vulnerabilities in their security systems.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
The aftermath of 9/11 led to an increase in cybersecurity strategies.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
Defining cybersecurity is not an issue in the academe.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
Critical infrastructures include transportation, electrical grid system, and banking systems.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
The ______ technique, also referred to as a banking Trojan, operates in the background of the computer by modifying banking transactions.

A) man-in-the-middle
B) WiFi eavesdropping
C) man-in-the-browser
D) man-in-the-cloud
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
According to the text, network attacks are attractive because they can go undetected and the perpetrators are difficult to trace.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
Identify and describe the two main forms of network-based attacks. How are they different? Use examples to differentiate the two.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
The ______ technique targets file-sharing tools, such as Google Drive.

A) man-in-the-middle
B) man-in-the-cloud
C) man-in-the-browser
D) WiFi eavesdropping
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
The National Cybersecurity and Communications Integration Center works alone in reducing the probability and the damage caused by cyberattacks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Explain the difficulties in defining cybersecurity.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Identify the benefits of wireless technology and the associated risks/vulnerabilities.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Describe the cybersecurity gap. Do you agree with the assertion of former Central Intelligence Agency director General Michael Hayden that there is a cybersecurity knowledge gap? Why or why not?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
The ______ technique targets devices that can be connected, such as car alarms, thermostats, etc.

A) man-in-the-IoT
B) man-in-the-cloud
C) man-in-the-browser
D) WiFi eavesdropping
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
The majority of critical infrastructure in the United States is owned by the public sector.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.