Cybersecurity Basics Quiz
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of cybersecurity threats?

  • To enhance data security
  • To steal or damage data (correct)
  • To promote digital literacy
  • To improve network access
  • Personal data only exists online.

    False

    Name one example of personal data collected offline.

    Identification number

    At the ____ level, there is a need to protect data where national security is at risk.

    <p>government</p> Signup and view all the answers

    Match the following types of personal data with their respective categories:

    <p>Name = Offline data Username = Online data Identification number = Offline data Social media profile = Online data</p> Signup and view all the answers

    Which of the following is NOT a level at which data needs to be protected?

    <p>Public level</p> Signup and view all the answers

    Social media is not a platform where personal data can be collected.

    <p>False</p> Signup and view all the answers

    What is one primary reason for protecting organizational data?

    <p>To secure sensitive business information</p> Signup and view all the answers

    What type of data do companies use to build customer personas?

    <p>Social media data</p> Signup and view all the answers

    Identity theft can involve stealing a person's money or taking loans in their name.

    <p>True</p> Signup and view all the answers

    What is the primary purpose of the McCumber Cube model?

    <p>To evaluate information security initiatives.</p> Signup and view all the answers

    Big data refers to a large volume of ______.

    <p>data</p> Signup and view all the answers

    Match the types of data with their descriptions:

    <p>Transactional data = Buying and selling activities Intellectual Property data = Patents and trademarks Financial data = Income statements and balance sheets Social media data = Insights from online interactions</p> Signup and view all the answers

    Which of the following is NOT a potential impact of identity theft?

    <p>Increased personal wealth</p> Signup and view all the answers

    Big data companies claim they are 'sharing' customer data instead of 'selling' it.

    <p>True</p> Signup and view all the answers

    Name one of the three dimensions of the McCumber Cube.

    <p>Desired goals, States of information, or Counter-measures.</p> Signup and view all the answers

    Which type of malware replicates itself to infect other computers?

    <p>Virus</p> Signup and view all the answers

    Trojan horse malware appears genuine but carries out dangerous operations.

    <p>True</p> Signup and view all the answers

    What is the main function of spyware?

    <p>It secretly collects data from a computer system.</p> Signup and view all the answers

    Malware is software written to harm or cause issues with a __________.

    <p>computer</p> Signup and view all the answers

    Match the types of malware with their descriptions:

    <p>Spyware = Collects data from a computer without the owner's knowledge Virus = Replicates itself to other computers Trojan Horse = Hides its true purpose behind legitimate software Ransomware = Encrypts user data and demands payment for access</p> Signup and view all the answers

    How can one protect against spyware?

    <p>Both A and C</p> Signup and view all the answers

    Denial-of-service is a type of malware.

    <p>False</p> Signup and view all the answers

    What are common ways that viruses spread?

    <p>USB drives, optical disks, network shares, or email.</p> Signup and view all the answers

    What is the primary goal of a Denial-of-Service (DoS) attack?

    <p>To overwhelm a network with traffic</p> Signup and view all the answers

    A DDoS attack originates from a single source.

    <p>False</p> Signup and view all the answers

    What term describes a network of infected computers controlled by an attacker?

    <p>botnet</p> Signup and view all the answers

    In a man-in-the-middle (mitm) attack, the attacker intercepts communications between a _____ and a web server.

    <p>web browser</p> Signup and view all the answers

    Match the following types of DoS threats with their descriptions:

    <p>DoS = Single source attack overwhelming a network DDoS = Multiple sources coordinating to attack a network mitm = Intercepting communications between two devices mitmo = Targeting a user's mobile device</p> Signup and view all the answers

    What method do attackers typically use to create a botnet?

    <p>All of the above</p> Signup and view all the answers

    Wi-Fi password cracking is an uncommon method of authentication for websites.

    <p>False</p> Signup and view all the answers

    Cyber attackers use _____ techniques to improve ranks of malicious sites in search results.

    <p>SEO poisoning</p> Signup and view all the answers

    What is a password spraying attack?

    <p>Trying a few commonly used passwords across many accounts.</p> Signup and view all the answers

    Brute-force attacks involve using a few commonly used passwords.

    <p>False</p> Signup and view all the answers

    What is the purpose of a rainbow table in cybersecurity?

    <p>To store passwords as numerical data and help in cracking hashed passwords.</p> Signup and view all the answers

    A __________ attack systematically tries every word from a dictionary as a password.

    <p>dictionary</p> Signup and view all the answers

    Match the type of attack with its description:

    <p>Password spraying = Using a few passwords across many accounts Traffic interception = Reading unsecured communication data Brute-force attack = Trying every possible combination of characters Dictionary attack = Using a list of common words to find passwords</p> Signup and view all the answers

    What type of attack involves the interception of communications?

    <p>Traffic interception</p> Signup and view all the answers

    Wi-Fi password cracking is a form of traffic interception.

    <p>True</p> Signup and view all the answers

    What is a common outcome of a successful dictionary attack?

    <p>Gaining unauthorized access to password-protected accounts.</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser