Podcast
Questions and Answers
What is the primary goal of cybersecurity threats?
What is the primary goal of cybersecurity threats?
- To enhance data security
- To steal or damage data (correct)
- To promote digital literacy
- To improve network access
Personal data only exists online.
Personal data only exists online.
False (B)
Name one example of personal data collected offline.
Name one example of personal data collected offline.
Identification number
At the ____ level, there is a need to protect data where national security is at risk.
At the ____ level, there is a need to protect data where national security is at risk.
Match the following types of personal data with their respective categories:
Match the following types of personal data with their respective categories:
Which of the following is NOT a level at which data needs to be protected?
Which of the following is NOT a level at which data needs to be protected?
Social media is not a platform where personal data can be collected.
Social media is not a platform where personal data can be collected.
What is one primary reason for protecting organizational data?
What is one primary reason for protecting organizational data?
What type of data do companies use to build customer personas?
What type of data do companies use to build customer personas?
Identity theft can involve stealing a person's money or taking loans in their name.
Identity theft can involve stealing a person's money or taking loans in their name.
What is the primary purpose of the McCumber Cube model?
What is the primary purpose of the McCumber Cube model?
Big data refers to a large volume of ______.
Big data refers to a large volume of ______.
Match the types of data with their descriptions:
Match the types of data with their descriptions:
Which of the following is NOT a potential impact of identity theft?
Which of the following is NOT a potential impact of identity theft?
Big data companies claim they are 'sharing' customer data instead of 'selling' it.
Big data companies claim they are 'sharing' customer data instead of 'selling' it.
Name one of the three dimensions of the McCumber Cube.
Name one of the three dimensions of the McCumber Cube.
Which type of malware replicates itself to infect other computers?
Which type of malware replicates itself to infect other computers?
Trojan horse malware appears genuine but carries out dangerous operations.
Trojan horse malware appears genuine but carries out dangerous operations.
What is the main function of spyware?
What is the main function of spyware?
Malware is software written to harm or cause issues with a __________.
Malware is software written to harm or cause issues with a __________.
Match the types of malware with their descriptions:
Match the types of malware with their descriptions:
How can one protect against spyware?
How can one protect against spyware?
Denial-of-service is a type of malware.
Denial-of-service is a type of malware.
What are common ways that viruses spread?
What are common ways that viruses spread?
What is the primary goal of a Denial-of-Service (DoS) attack?
What is the primary goal of a Denial-of-Service (DoS) attack?
A DDoS attack originates from a single source.
A DDoS attack originates from a single source.
What term describes a network of infected computers controlled by an attacker?
What term describes a network of infected computers controlled by an attacker?
In a man-in-the-middle (mitm) attack, the attacker intercepts communications between a _____ and a web server.
In a man-in-the-middle (mitm) attack, the attacker intercepts communications between a _____ and a web server.
Match the following types of DoS threats with their descriptions:
Match the following types of DoS threats with their descriptions:
What method do attackers typically use to create a botnet?
What method do attackers typically use to create a botnet?
Wi-Fi password cracking is an uncommon method of authentication for websites.
Wi-Fi password cracking is an uncommon method of authentication for websites.
Cyber attackers use _____ techniques to improve ranks of malicious sites in search results.
Cyber attackers use _____ techniques to improve ranks of malicious sites in search results.
What is a password spraying attack?
What is a password spraying attack?
Brute-force attacks involve using a few commonly used passwords.
Brute-force attacks involve using a few commonly used passwords.
What is the purpose of a rainbow table in cybersecurity?
What is the purpose of a rainbow table in cybersecurity?
A __________ attack systematically tries every word from a dictionary as a password.
A __________ attack systematically tries every word from a dictionary as a password.
Match the type of attack with its description:
Match the type of attack with its description:
What type of attack involves the interception of communications?
What type of attack involves the interception of communications?
Wi-Fi password cracking is a form of traffic interception.
Wi-Fi password cracking is a form of traffic interception.
What is a common outcome of a successful dictionary attack?
What is a common outcome of a successful dictionary attack?