Cybersecurity Basics Quiz

ImportantGladiolus avatar
ImportantGladiolus
·
·
Download

Start Quiz

Study Flashcards

16 Questions

What is the definition of cybersecurity?

The protection of computer systems, networks, and data from digital attacks

How has the Internet of Things changed cybercrime and cybersecurity?

It has made us more open to cybercrime by increasing device connectivity and data accessibility

Which principle of the CIA Triad ensures that systems and data are accessible by authorized users when and where needed?

Availability

What is the term for the information about a person that exists on the Internet as a result of their online activity?

Digital footprint

What type of information makes up a person's digital footprint?

Emails and social media interactions

What is one characteristic of a person's digital footprint?

Public and permanent

What is the 'right to be forgotten'?

A right to remove search results containing incorrect, unfair, or one-sided information

Who is likely to look at your digital footprint?

Schools for admissions and scholarships

What should complex passwords contain?

Lowercase and uppercase letters, numbers, special characters

What is two factor authentication?

Using a password and a verification code for authentication

What term describes using charts, graphs, or images to display complex data?

Data visualization

What is the appropriate use of your data called?

Data privacy

How can data visualizations be skewed to be misleading?

Starting the y axis at 0

What does using quotation marks around a word or phrase do in an internet search?

Returns results including the exact phrase in quotation marks

What type of information is best presented through bar graphs?

Comparisons

What characteristics of a website can help determine its credibility?

Author, date of publication, site design

Study Notes

Cybersecurity Fundamentals

  • Cybersecurity is the practice of protecting systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction.

Impact of Internet of Things (IoT) on Cybercrime and Cybersecurity

  • The IoT has increased the attack surface, making it easier for cybercriminals to compromise devices and perpetuate cybercrime.
  • The IoT has also raised new challenges for cybersecurity, such as managing and securing a vast number of connected devices.

CIA Triad Principle

  • The principle of Availability ensures that systems and data are accessible by authorized users when and where needed.

Digital Footprint

  • A digital footprint refers to the information about a person that exists on the Internet as a result of their online activity.
  • A person's digital footprint is composed of various types of information, including social media profiles, online searches, and browsing history.
  • One characteristic of a digital footprint is that it can be permanent, making it challenging to erase or remove.

Right to be Forgotten

  • The right to be forgotten is the ability to request that online platforms and search engines remove personal information from public access.

Digital Footprint Monitoring

  • Employers, landlords, and law enforcement agencies are likely to look at a person's digital footprint.

Password Security

  • Complex passwords should contain a mix of uppercase and lowercase letters, numbers, and special characters.

Two-Factor Authentication

  • Two-factor authentication is a security process that requires a user to provide two forms of verification, such as a password and a fingerprint, to access a system or data.

Data Visualization

  • Data visualization is the term that describes using charts, graphs, or images to display complex data.
  • Data visualization can be skewed to be misleading by using biased or incomplete data, or by manipulating the scale and presentation of the data.

Data Use

  • The appropriate use of data is called data ethics.
  • Using quotation marks around a word or phrase in an internet search returns exact matches for the phrase, rather than individual results for each word.

Data Presentation

  • Bar graphs are best suited for presenting categorical data, where the goal is to compare the frequency or distribution of different categories.

Website Credibility

  • Characteristics of a website that can help determine its credibility include the domain name, author credentials, and the presence of citations or references.

Test your knowledge of cybersecurity basics with this quiz. Learn about the definition of cybersecurity, the impact of the Internet of Things on cybercrime, and the principles of the CIA Triad.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

IoT Security Quiz
5 questions

IoT Security Quiz

ReputableSerpentine avatar
ReputableSerpentine
Cybersecurity and CIA Triad Quiz
16 questions
Use Quizgecko on...
Browser
Browser