Introduction to Cybersecurity M1-M4
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Which of the following methods is used to check the integrity of data? Backup Hashes or checksums Encryption Authentication | show 🗑
|
||||
Which of the following statements describes cyberwarfare? | show 🗑
|
||||
show | Data encryption
Two-factor authentication
Username ID and password
🗑
|
||||
show | Social security number
Driver license number
Date and place of birth
🗑
|
||||
show | Internal users have direct access to the infrastructure devices
🗑
|
||||
Which of the following is a key motivation of a white hat attacker? | show 🗑
|
||||
An individual user profile on a social network site is an example of an ______ identity. Online Offline | show 🗑
|
||||
show | Your online identity – Personal
A customer database – Organizational
Economic stabilty – Government
🗑
|
||||
Your neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right? | show 🗑
|
||||
show | Integrity
Availability
Confidentiality
🗑
|
||||
Stuxnet malware was designed for which primary purpose? | show 🗑
|
||||
Which of the following examples illustrates how malware might be concealed? | show 🗑
|
||||
show | To gain privileged access to a device while concealing itself
🗑
|
||||
show | Password Cracking
🗑
|
||||
show | To increase web traffic to malicious sites
🗑
|
||||
What do you call a program written to take advantage of a known security vulnerability? An exploit Antivirus A firewall A software update | show 🗑
|
||||
show | Non-validated input
🗑
|
||||
A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what? A hack A patch An install A fix | show 🗑
|
||||
What is a miner? | show 🗑
|
||||
What is the primary goal of a DoS attack? | show 🗑
|
||||
Which of the following should be carried out to address known software vulnerabilities of a specific application? | show 🗑
|
||||
show | Travels to new computers without any intervention or knowledge of the user
Is self-replicating
🗑
|
||||
Who is responsible for overseeing a blockchain electronic ledger? A central bank Anyone belonging to the blockchain network A government regulatory body A central blockchain authority | show 🗑
|
||||
Securing physical access to target equipment is an organization’s best defense against a cyber attack.’ Is this true or false? | show 🗑
|
||||
Where is cryptocurrency stored? In a wallet On an exchange In a bank account On the blockchain | show 🗑
|
||||
You have stored your data on a local hard disk. Which method would secure this data from unauthorized access? | show 🗑
|
||||
How can you keep your personal browsing history hidden from other users on a shared computer? | show 🗑
|
||||
show | Antispyware
🗑
|
||||
Why do IoT devices pose a greater security risk than other computing devices on a network? | show 🗑
|
||||
show | Set up password protection
🗑
|
||||
show | Your fingerprint and your password
🗑
|
||||
show | The cloud storage service is an approved application for the online printing service
🗑
|
||||
show | Save the passwords in a centralized password manager program
🗑
|
||||
show | Use special characters such as ! @ or $
🗑
|
||||
Which of the following passwords would most likely take the longest for an attacker to guess or break? | show 🗑
|
||||
show | Always disable Bluetooth when it is not being used
🗑
|
||||
show | Connect with a VPN service
🗑
|
||||
Which configuration on a wireless router is not considered to be adequate security for a wireless network? | show 🗑
|
||||
Which technology removes direct equipment and maintenance costs from the user for data backups? | show 🗑
|
||||
What is the only way of ensuring that deleted files on your computer are irrecoverable? | show 🗑
|
||||
show | The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities
🗑
|
||||
Which of the following tools can be used to provide a list of open ports on network devices? Ping Tracert Nmap Whois | show 🗑
|
||||
Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks? | show 🗑
|
||||
‘Today, there are single security appliances that will solve all the network security needs of an organization.’ Is this statement true or false? | show 🗑
|
||||
What name is given to a device that controls or filters traffic going in or out of the network? | show 🗑
|
||||
show | IDS
🗑
|
||||
show | Netflow
🗑
|
||||
Behavior-based analysis involves using baseline information to detect what? Risk Anomalies Backdoors Vulnerabilities | show 🗑
|
||||
What is the last stage of a pen test? Scanning Analysis and reporting Gathering target information Maintaining access | show 🗑
|
||||
What is a security playbook? | show 🗑
|
||||
show | To help ensure organization, system and data preservation by performing investigations into computer security incidents
🗑
|
||||
How do Cisco ISE and TrustSec work? | show 🗑
|
||||
show | 1. Frame the risk
2. Assess the risk
3. Respond to the risk
4. Monitor the risk
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
cinnamonbr34d