Cybersecurity Basics Quiz
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of cybersecurity threats?

  • To enhance data security
  • To steal or damage data (correct)
  • To promote digital literacy
  • To improve network access

Personal data only exists online.

False (B)

Name one example of personal data collected offline.

Identification number

At the ____ level, there is a need to protect data where national security is at risk.

<p>government</p> Signup and view all the answers

Match the following types of personal data with their respective categories:

<p>Name = Offline data Username = Online data Identification number = Offline data Social media profile = Online data</p> Signup and view all the answers

Which of the following is NOT a level at which data needs to be protected?

<p>Public level (A)</p> Signup and view all the answers

Social media is not a platform where personal data can be collected.

<p>False (B)</p> Signup and view all the answers

What is one primary reason for protecting organizational data?

<p>To secure sensitive business information</p> Signup and view all the answers

What type of data do companies use to build customer personas?

<p>Social media data (C)</p> Signup and view all the answers

Identity theft can involve stealing a person's money or taking loans in their name.

<p>True (A)</p> Signup and view all the answers

What is the primary purpose of the McCumber Cube model?

<p>To evaluate information security initiatives.</p> Signup and view all the answers

Big data refers to a large volume of ______.

<p>data</p> Signup and view all the answers

Match the types of data with their descriptions:

<p>Transactional data = Buying and selling activities Intellectual Property data = Patents and trademarks Financial data = Income statements and balance sheets Social media data = Insights from online interactions</p> Signup and view all the answers

Which of the following is NOT a potential impact of identity theft?

<p>Increased personal wealth (B)</p> Signup and view all the answers

Big data companies claim they are 'sharing' customer data instead of 'selling' it.

<p>True (A)</p> Signup and view all the answers

Name one of the three dimensions of the McCumber Cube.

<p>Desired goals, States of information, or Counter-measures.</p> Signup and view all the answers

Which type of malware replicates itself to infect other computers?

<p>Virus (D)</p> Signup and view all the answers

Trojan horse malware appears genuine but carries out dangerous operations.

<p>True (A)</p> Signup and view all the answers

What is the main function of spyware?

<p>It secretly collects data from a computer system.</p> Signup and view all the answers

Malware is software written to harm or cause issues with a __________.

<p>computer</p> Signup and view all the answers

Match the types of malware with their descriptions:

<p>Spyware = Collects data from a computer without the owner's knowledge Virus = Replicates itself to other computers Trojan Horse = Hides its true purpose behind legitimate software Ransomware = Encrypts user data and demands payment for access</p> Signup and view all the answers

How can one protect against spyware?

<p>Both A and C (C)</p> Signup and view all the answers

Denial-of-service is a type of malware.

<p>False (B)</p> Signup and view all the answers

What are common ways that viruses spread?

<p>USB drives, optical disks, network shares, or email.</p> Signup and view all the answers

What is the primary goal of a Denial-of-Service (DoS) attack?

<p>To overwhelm a network with traffic (B)</p> Signup and view all the answers

A DDoS attack originates from a single source.

<p>False (B)</p> Signup and view all the answers

What term describes a network of infected computers controlled by an attacker?

<p>botnet</p> Signup and view all the answers

In a man-in-the-middle (mitm) attack, the attacker intercepts communications between a _____ and a web server.

<p>web browser</p> Signup and view all the answers

Match the following types of DoS threats with their descriptions:

<p>DoS = Single source attack overwhelming a network DDoS = Multiple sources coordinating to attack a network mitm = Intercepting communications between two devices mitmo = Targeting a user's mobile device</p> Signup and view all the answers

What method do attackers typically use to create a botnet?

<p>All of the above (D)</p> Signup and view all the answers

Wi-Fi password cracking is an uncommon method of authentication for websites.

<p>False (B)</p> Signup and view all the answers

Cyber attackers use _____ techniques to improve ranks of malicious sites in search results.

<p>SEO poisoning</p> Signup and view all the answers

What is a password spraying attack?

<p>Trying a few commonly used passwords across many accounts. (D)</p> Signup and view all the answers

Brute-force attacks involve using a few commonly used passwords.

<p>False (B)</p> Signup and view all the answers

What is the purpose of a rainbow table in cybersecurity?

<p>To store passwords as numerical data and help in cracking hashed passwords.</p> Signup and view all the answers

A __________ attack systematically tries every word from a dictionary as a password.

<p>dictionary</p> Signup and view all the answers

Match the type of attack with its description:

<p>Password spraying = Using a few passwords across many accounts Traffic interception = Reading unsecured communication data Brute-force attack = Trying every possible combination of characters Dictionary attack = Using a list of common words to find passwords</p> Signup and view all the answers

What type of attack involves the interception of communications?

<p>Traffic interception (B)</p> Signup and view all the answers

Wi-Fi password cracking is a form of traffic interception.

<p>True (A)</p> Signup and view all the answers

What is a common outcome of a successful dictionary attack?

<p>Gaining unauthorized access to password-protected accounts.</p> Signup and view all the answers

More Like This

Cybersecurity Basics
7 questions

Cybersecurity Basics

SubstantivePedalSteelGuitar avatar
SubstantivePedalSteelGuitar
ITCS318 Long Quiz Reviewer
48 questions
Cybersecurity Threats and Data Protection Laws
32 questions
Use Quizgecko on...
Browser
Browser