Podcast
Questions and Answers
Which term refers to the protection of computer systems and networks from attacks by malicious actors?
Which term refers to the protection of computer systems and networks from attacks by malicious actors?
- Digital security
- Computer security
- Cybersecurity (correct)
- Information technology security
What are some examples of smart devices mentioned in the text?
What are some examples of smart devices mentioned in the text?
- Laptops and desktop computers
- Routers and modems
- Printers and scanners
- Smartphones and televisions (correct)
When did computer security start to expand beyond academia with the conception of the Internet?
When did computer security start to expand beyond academia with the conception of the Internet?
- 1970s
- 1980s
- 1990s (correct)
- 2000s
Which conference and report were foundational moments in the history of computer security?
Which conference and report were foundational moments in the history of computer security?
What did the 1977 NIST publication introduce as a clear and simple way to describe key security goals?
What did the 1977 NIST publication introduce as a clear and simple way to describe key security goals?
What were the main threats to computer security in the 1970s and 1980s?
What were the main threats to computer security in the 1970s and 1980s?
Which program was one of the earliest examples of an attack on a computer network?
Which program was one of the earliest examples of an attack on a computer network?
Which type of attack is designed to make a machine or network resource unavailable to its intended users?
Which type of attack is designed to make a machine or network resource unavailable to its intended users?
Which type of attack involves an unauthorized user gaining physical access to a computer and directly copying data from it?
Which type of attack involves an unauthorized user gaining physical access to a computer and directly copying data from it?
Which type of attack involves surreptitiously listening to a private computer conversation between hosts on a network?
Which type of attack involves surreptitiously listening to a private computer conversation between hosts on a network?
Which type of attack involves attempting to acquire sensitive information, such as usernames and passwords, by deceiving users?
Which type of attack involves attempting to acquire sensitive information, such as usernames and passwords, by deceiving users?
Flashcards are hidden until you start studying