Cybersecurity Concepts
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes the purpose of a Non-Disclosure Agreement (NDA)?

  • To grant an employee the right to share proprietary information freely.
  • To allow employees to leak company secrets to competitors.
  • To prevent an employee from sharing a company's confidential information. (correct)
  • To encourage open communication of company strategies with the public.

What is meant by the term 'objectively' in a professional context?

  • Presenting information in a balanced and fair manner without personal bias. (correct)
  • Ignoring factual evidence in favor of emotional arguments.
  • Expressing a personal opinion without considering other viewpoints.
  • Presenting information in a biased manner to support a specific agenda.

Which characteristic defines open-source software?

  • It can only be used for non-commercial purposes.
  • It is available for purchase under a strict copyright license.
  • Its source code is kept secret and proprietary.
  • Its source code is freely available to the public. (correct)

What is the primary function of packet sniffers in cybersecurity?

<p>To monitor and capture data transmitted over a network, potentially revealing sensitive information. (B)</p> Signup and view all the answers

Which of the following constitutes phishing?

<p>Luring users into revealing sensitive information by impersonating a legitimate entity. (D)</p> Signup and view all the answers

Which activity constitutes software piracy?

<p>Making unauthorized copies of copyrighted software. (D)</p> Signup and view all the answers

What is the key characteristic of 'Public Domain' intellectual property?

<p>It is not subject to copyright laws and can be used freely. (B)</p> Signup and view all the answers

Which of these describes a 'timebomb' in the context of cybersecurity?

<p>A computer virus designed to activate at a specific time or date. (C)</p> Signup and view all the answers

A software developer discovers a critical vulnerability in their application and intentionally leaves it unpatched, planning to exploit it later for personal gain. This vulnerability is disguised within seemingly benign code. This is closest to the definition of which of the following?

<p>Trapdoor (B)</p> Signup and view all the answers

Consider a scenario where a threat actor employs a combination of spear-phishing, pretexting, and quid pro quo techniques to acquire sensitive information from an organization's employees. This falls under what broad class of attacks?

<p>Social engineering (D)</p> Signup and view all the answers

Which of the following best describes the purpose of an Acceptable Use Policy?

<p>To provide guidelines for ethical online behavior and consequences for violations. (A)</p> Signup and view all the answers

What is the primary function of an anti-virus program?

<p>To identify and remove malicious software like viruses. (D)</p> Signup and view all the answers

Which of the following is an example of 'catfishing'?

<p>Using a fake online identity to deceive someone. (B)</p> Signup and view all the answers

What is the purpose of a citation?

<p>To give credit to the source, and allow the reader to independently verify the information. (C)</p> Signup and view all the answers

Which of the following is the most accurate description of 'Netiquette'?

<p>An informal set of guidelines for appropriate and respectful online communication. (B)</p> Signup and view all the answers

How does a Creative Commons license differ from standard copyright?

<p>Creative Commons licenses allow copyright holders to specify which uses of their work are permitted. (C)</p> Signup and view all the answers

What is the 'digital divide,' and why is it a concern?

<p>The disparity in access to technology and internet, creating educational and economic disadvantages for some groups. (D)</p> Signup and view all the answers

Under what circumstances does the 'Fair Use Doctrine' typically apply?

<p>Using copyrighted material without permission for educational purposes, for example, a school research paper. (A)</p> Signup and view all the answers

Explain how multifactor authentication (MFA) enhances online security.

<p>Adds additional layers of verification, such as a code sent to a mobile device, to confirm the user's identity. (C)</p> Signup and view all the answers

Which of the following scenarios would most likely be classified as computer crime but not necessarily cybercrime?

<p>Physically stealing a laptop containing confidential business information from an office, without using the computer to commit further illegal acts. (C)</p> Signup and view all the answers

Flashcards

Acceptable Use Policy

Rules outlining acceptable online behavior and consequences for violations.

Anti-Virus Program

Software that identifies and removes viruses.

Antimalware Program

Software to identify and remove malware.

Catfishing

Pretending to be someone else online to deceive.

Signup and view all the flashcards

Censor

Blocking access to content deemed inappropriate.

Signup and view all the flashcards

Cookie

Small files storing website identification information on your computer.

Signup and view all the flashcards

Copyright

The legal right to control creative, literary, or artistic work.

Signup and view all the flashcards

Cyberbully

Using technology to harass or bully someone.

Signup and view all the flashcards

Digital Divide

The gap between those with and without access to technology.

Signup and view all the flashcards

Netiquette

Informal rules for proper and polite online behavior.

Signup and view all the flashcards

Non-Disclosure Agreement

A contract preventing an employee from sharing company secrets.

Signup and view all the flashcards

Open-Source Software

Software where the source code is publicly available.

Signup and view all the flashcards

Plagiarism

Illegally copying someone else's creative work.

Signup and view all the flashcards

Proprietary Information

Information a company owns and keeps private.

Signup and view all the flashcards

Proprietary Software

Copyrighted software you must purchase to use.

Signup and view all the flashcards

Public Domain Software

Software that is free for anyone to use, no copyright.

Signup and view all the flashcards

Shareware

Copyrighted software you can try before buying.

Signup and view all the flashcards

Software Piracy

Illegally copying computer programs.

Signup and view all the flashcards

Strong Password

A password hard to guess by hackers.

Signup and view all the flashcards

Trojan Horse

Malware that looks harmless but allows unauthorized access.

Signup and view all the flashcards

Use Quizgecko on...
Browser
Browser