Cybersecurity Basics Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary goal of cybersecurity threats?

  • To enhance data security
  • To steal or damage data (correct)
  • To promote digital literacy
  • To improve network access

Personal data only exists online.

False (B)

Name one example of personal data collected offline.

Identification number

At the ____ level, there is a need to protect data where national security is at risk.

<p>government</p> Signup and view all the answers

Match the following types of personal data with their respective categories:

<p>Name = Offline data Username = Online data Identification number = Offline data Social media profile = Online data</p> Signup and view all the answers

Which of the following is NOT a level at which data needs to be protected?

<p>Public level (A)</p> Signup and view all the answers

Social media is not a platform where personal data can be collected.

<p>False (B)</p> Signup and view all the answers

What is one primary reason for protecting organizational data?

<p>To secure sensitive business information</p> Signup and view all the answers

What type of data do companies use to build customer personas?

<p>Social media data (C)</p> Signup and view all the answers

Identity theft can involve stealing a person's money or taking loans in their name.

<p>True (A)</p> Signup and view all the answers

What is the primary purpose of the McCumber Cube model?

<p>To evaluate information security initiatives.</p> Signup and view all the answers

Big data refers to a large volume of ______.

<p>data</p> Signup and view all the answers

Match the types of data with their descriptions:

<p>Transactional data = Buying and selling activities Intellectual Property data = Patents and trademarks Financial data = Income statements and balance sheets Social media data = Insights from online interactions</p> Signup and view all the answers

Which of the following is NOT a potential impact of identity theft?

<p>Increased personal wealth (B)</p> Signup and view all the answers

Big data companies claim they are 'sharing' customer data instead of 'selling' it.

<p>True (A)</p> Signup and view all the answers

Name one of the three dimensions of the McCumber Cube.

<p>Desired goals, States of information, or Counter-measures.</p> Signup and view all the answers

Which type of malware replicates itself to infect other computers?

<p>Virus (D)</p> Signup and view all the answers

Trojan horse malware appears genuine but carries out dangerous operations.

<p>True (A)</p> Signup and view all the answers

What is the main function of spyware?

<p>It secretly collects data from a computer system.</p> Signup and view all the answers

Malware is software written to harm or cause issues with a __________.

<p>computer</p> Signup and view all the answers

Match the types of malware with their descriptions:

<p>Spyware = Collects data from a computer without the owner's knowledge Virus = Replicates itself to other computers Trojan Horse = Hides its true purpose behind legitimate software Ransomware = Encrypts user data and demands payment for access</p> Signup and view all the answers

How can one protect against spyware?

<p>Both A and C (C)</p> Signup and view all the answers

Denial-of-service is a type of malware.

<p>False (B)</p> Signup and view all the answers

What are common ways that viruses spread?

<p>USB drives, optical disks, network shares, or email.</p> Signup and view all the answers

What is the primary goal of a Denial-of-Service (DoS) attack?

<p>To overwhelm a network with traffic (B)</p> Signup and view all the answers

A DDoS attack originates from a single source.

<p>False (B)</p> Signup and view all the answers

What term describes a network of infected computers controlled by an attacker?

<p>botnet</p> Signup and view all the answers

In a man-in-the-middle (mitm) attack, the attacker intercepts communications between a _____ and a web server.

<p>web browser</p> Signup and view all the answers

Match the following types of DoS threats with their descriptions:

<p>DoS = Single source attack overwhelming a network DDoS = Multiple sources coordinating to attack a network mitm = Intercepting communications between two devices mitmo = Targeting a user's mobile device</p> Signup and view all the answers

What method do attackers typically use to create a botnet?

<p>All of the above (D)</p> Signup and view all the answers

Wi-Fi password cracking is an uncommon method of authentication for websites.

<p>False (B)</p> Signup and view all the answers

Cyber attackers use _____ techniques to improve ranks of malicious sites in search results.

<p>SEO poisoning</p> Signup and view all the answers

What is a password spraying attack?

<p>Trying a few commonly used passwords across many accounts. (D)</p> Signup and view all the answers

Brute-force attacks involve using a few commonly used passwords.

<p>False (B)</p> Signup and view all the answers

What is the purpose of a rainbow table in cybersecurity?

<p>To store passwords as numerical data and help in cracking hashed passwords.</p> Signup and view all the answers

A __________ attack systematically tries every word from a dictionary as a password.

<p>dictionary</p> Signup and view all the answers

Match the type of attack with its description:

<p>Password spraying = Using a few passwords across many accounts Traffic interception = Reading unsecured communication data Brute-force attack = Trying every possible combination of characters Dictionary attack = Using a list of common words to find passwords</p> Signup and view all the answers

What type of attack involves the interception of communications?

<p>Traffic interception (B)</p> Signup and view all the answers

Wi-Fi password cracking is a form of traffic interception.

<p>True (A)</p> Signup and view all the answers

What is a common outcome of a successful dictionary attack?

<p>Gaining unauthorized access to password-protected accounts.</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Cybersecurity Basics
7 questions

Cybersecurity Basics

SubstantivePedalSteelGuitar avatar
SubstantivePedalSteelGuitar
Cybersecurity Threats and Offline Storage
16 questions
Cybersecurity Threats and Data Protection Laws
32 questions
Cybersecurity Threats and Best Practices
38 questions
Use Quizgecko on...
Browser
Browser