Podcast
Questions and Answers
What is the primary goal of cybersecurity threats?
What is the primary goal of cybersecurity threats?
Personal data only exists online.
Personal data only exists online.
False
Name one example of personal data collected offline.
Name one example of personal data collected offline.
Identification number
At the ____ level, there is a need to protect data where national security is at risk.
At the ____ level, there is a need to protect data where national security is at risk.
Signup and view all the answers
Match the following types of personal data with their respective categories:
Match the following types of personal data with their respective categories:
Signup and view all the answers
Which of the following is NOT a level at which data needs to be protected?
Which of the following is NOT a level at which data needs to be protected?
Signup and view all the answers
Social media is not a platform where personal data can be collected.
Social media is not a platform where personal data can be collected.
Signup and view all the answers
What is one primary reason for protecting organizational data?
What is one primary reason for protecting organizational data?
Signup and view all the answers
What type of data do companies use to build customer personas?
What type of data do companies use to build customer personas?
Signup and view all the answers
Identity theft can involve stealing a person's money or taking loans in their name.
Identity theft can involve stealing a person's money or taking loans in their name.
Signup and view all the answers
What is the primary purpose of the McCumber Cube model?
What is the primary purpose of the McCumber Cube model?
Signup and view all the answers
Big data refers to a large volume of ______.
Big data refers to a large volume of ______.
Signup and view all the answers
Match the types of data with their descriptions:
Match the types of data with their descriptions:
Signup and view all the answers
Which of the following is NOT a potential impact of identity theft?
Which of the following is NOT a potential impact of identity theft?
Signup and view all the answers
Big data companies claim they are 'sharing' customer data instead of 'selling' it.
Big data companies claim they are 'sharing' customer data instead of 'selling' it.
Signup and view all the answers
Name one of the three dimensions of the McCumber Cube.
Name one of the three dimensions of the McCumber Cube.
Signup and view all the answers
Which type of malware replicates itself to infect other computers?
Which type of malware replicates itself to infect other computers?
Signup and view all the answers
Trojan horse malware appears genuine but carries out dangerous operations.
Trojan horse malware appears genuine but carries out dangerous operations.
Signup and view all the answers
What is the main function of spyware?
What is the main function of spyware?
Signup and view all the answers
Malware is software written to harm or cause issues with a __________.
Malware is software written to harm or cause issues with a __________.
Signup and view all the answers
Match the types of malware with their descriptions:
Match the types of malware with their descriptions:
Signup and view all the answers
How can one protect against spyware?
How can one protect against spyware?
Signup and view all the answers
Denial-of-service is a type of malware.
Denial-of-service is a type of malware.
Signup and view all the answers
What are common ways that viruses spread?
What are common ways that viruses spread?
Signup and view all the answers
What is the primary goal of a Denial-of-Service (DoS) attack?
What is the primary goal of a Denial-of-Service (DoS) attack?
Signup and view all the answers
A DDoS attack originates from a single source.
A DDoS attack originates from a single source.
Signup and view all the answers
What term describes a network of infected computers controlled by an attacker?
What term describes a network of infected computers controlled by an attacker?
Signup and view all the answers
In a man-in-the-middle (mitm) attack, the attacker intercepts communications between a _____ and a web server.
In a man-in-the-middle (mitm) attack, the attacker intercepts communications between a _____ and a web server.
Signup and view all the answers
Match the following types of DoS threats with their descriptions:
Match the following types of DoS threats with their descriptions:
Signup and view all the answers
What method do attackers typically use to create a botnet?
What method do attackers typically use to create a botnet?
Signup and view all the answers
Wi-Fi password cracking is an uncommon method of authentication for websites.
Wi-Fi password cracking is an uncommon method of authentication for websites.
Signup and view all the answers
Cyber attackers use _____ techniques to improve ranks of malicious sites in search results.
Cyber attackers use _____ techniques to improve ranks of malicious sites in search results.
Signup and view all the answers
What is a password spraying attack?
What is a password spraying attack?
Signup and view all the answers
Brute-force attacks involve using a few commonly used passwords.
Brute-force attacks involve using a few commonly used passwords.
Signup and view all the answers
What is the purpose of a rainbow table in cybersecurity?
What is the purpose of a rainbow table in cybersecurity?
Signup and view all the answers
A __________ attack systematically tries every word from a dictionary as a password.
A __________ attack systematically tries every word from a dictionary as a password.
Signup and view all the answers
Match the type of attack with its description:
Match the type of attack with its description:
Signup and view all the answers
What type of attack involves the interception of communications?
What type of attack involves the interception of communications?
Signup and view all the answers
Wi-Fi password cracking is a form of traffic interception.
Wi-Fi password cracking is a form of traffic interception.
Signup and view all the answers
What is a common outcome of a successful dictionary attack?
What is a common outcome of a successful dictionary attack?
Signup and view all the answers