Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Introduction to Cybersecurity M1-M4

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Which of the following methods is used to check the integrity of data? Backup Hashes or checksums Encryption Authentication   show
🗑
Which of the following statements describes cyberwarfare?   show
🗑
show Data encryption Two-factor authentication Username ID and password  
🗑
show Social security number Driver license number Date and place of birth  
🗑
show Internal users have direct access to the infrastructure devices  
🗑
Which of the following is a key motivation of a white hat attacker?   show
🗑
An individual user profile on a social network site is an example of an ______ identity. Online Offline   show
🗑
show Your online identity – Personal A customer database – Organizational Economic stabilty – Government  
🗑
Your neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?   show
🗑
show Integrity Availability Confidentiality  
🗑
Stuxnet malware was designed for which primary purpose?   show
🗑
Which of the following examples illustrates how malware might be concealed?   show
🗑
show To gain privileged access to a device while concealing itself  
🗑
show Password Cracking  
🗑
show To increase web traffic to malicious sites  
🗑
What do you call a program written to take advantage of a known security vulnerability? An exploit Antivirus A firewall A software update   show
🗑
show Non-validated input  
🗑
A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what? A hack A patch An install A fix   show
🗑
What is a miner?   show
🗑
What is the primary goal of a DoS attack?   show
🗑
Which of the following should be carried out to address known software vulnerabilities of a specific application?   show
🗑
show Travels to new computers without any intervention or knowledge of the user Is self-replicating  
🗑
Who is responsible for overseeing a blockchain electronic ledger? A central bank Anyone belonging to the blockchain network A government regulatory body A central blockchain authority   show
🗑
Securing physical access to target equipment is an organization’s best defense against a cyber attack.’ Is this true or false?   show
🗑
Where is cryptocurrency stored? In a wallet On an exchange In a bank account On the blockchain   show
🗑
You have stored your data on a local hard disk. Which method would secure this data from unauthorized access?   show
🗑
How can you keep your personal browsing history hidden from other users on a shared computer?   show
🗑
show Antispyware  
🗑
Why do IoT devices pose a greater security risk than other computing devices on a network?   show
🗑
show Set up password protection  
🗑
show Your fingerprint and your password  
🗑
show The cloud storage service is an approved application for the online printing service  
🗑
show Save the passwords in a centralized password manager program  
🗑
show Use special characters such as ! @ or $  
🗑
Which of the following passwords would most likely take the longest for an attacker to guess or break?   show
🗑
show Always disable Bluetooth when it is not being used  
🗑
show Connect with a VPN service  
🗑
Which configuration on a wireless router is not considered to be adequate security for a wireless network?   show
🗑
Which technology removes direct equipment and maintenance costs from the user for data backups?   show
🗑
What is the only way of ensuring that deleted files on your computer are irrecoverable?   show
🗑
show The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities  
🗑
Which of the following tools can be used to provide a list of open ports on network devices? Ping Tracert Nmap Whois   show
🗑
Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?   show
🗑
‘Today, there are single security appliances that will solve all the network security needs of an organization.’ Is this statement true or false?   show
🗑
What name is given to a device that controls or filters traffic going in or out of the network?   show
🗑
show IDS  
🗑
show Netflow  
🗑
Behavior-based analysis involves using baseline information to detect what? Risk Anomalies Backdoors Vulnerabilities   show
🗑
What is the last stage of a pen test? Scanning Analysis and reporting Gathering target information Maintaining access   show
🗑
What is a security playbook?   show
🗑
show To help ensure organization, system and data preservation by performing investigations into computer security incidents  
🗑
How do Cisco ISE and TrustSec work?   show
🗑
show 1. Frame the risk 2. Assess the risk 3. Respond to the risk 4. Monitor the risk  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: cinnamonbr34d