Time limit: 0
Quiz-summary
0 of 13 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
Information
Introduction to Cybersecurity Module 1 Quiz Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 13 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- Answered
- Review
-
Question 1 of 13
1. Question
1 pointsWhich of the following methods is used to check the integrity of data?Correct
Incorrect
Hint
Integrity ensures that system information or processes are protected from intentional or accidental modification. One way to ensure integrity is to use a hash function or checksum. -
Question 2 of 13
2. Question
1 pointsWhich of the following statements describes cyberwarfare?Correct
Incorrect
Hint
Cyberwarfare, as its name suggests, is the use of technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services, such as shutting down a power grid. -
Question 3 of 13
3. Question
1 pointsWhich of the following methods can be used to ensure confidentiality of information? (Choose three correct answers)Correct
Incorrect
Hint
Methods to ensure confidentiality include data encryption, identity proofing and two factor authentication. -
Question 4 of 13
4. Question
1 pointsWhich of the following pieces of information would be classified as personal data? (Select three correct answers)Correct
Incorrect
Hint
Personal data describes any information about you, including your name, social security number, driver license number, date and place of birth, your mother’s maiden name, and even pictures or messages that you exchange with family and friends. -
Question 5 of 13
5. Question
1 pointsWhy might internal security threats cause greater damage to an organization than external security threats?Correct
Incorrect
-
Question 6 of 13
6. Question
1 pointsWhich of the following is a key motivation of a white hat attacker?Correct
Incorrect
-
Question 7 of 13
7. Question
1 pointsAn individual user profile on a social network site is an example of an ______ identity.Correct
Incorrect
-
Question 8 of 13
8. Question
1 pointsCybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. What level of cyber protection does each of the following factors require?Correct
Incorrect
-
Question 9 of 13
9. Question
1 pointsYour neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?Correct
Incorrect
-
Question 10 of 13
10. Question
1 pointsWhat are the foundational principles for protecting information systems as outlined in the McCumber Cube? (Choose three correct answers)Correct
Incorrect
-
Question 11 of 13
11. Question
1 pointsCan you identify why each of the following organizations might be interested in your online identity?Correct
Incorrect
-
Question 12 of 13
12. Question
1 pointsCan you identify the cyber attacker type from the following descriptions?Correct
Incorrect
-
Question 13 of 13
13. Question
1 pointsStuxnet malware was designed for which primary purpose?Correct
Incorrect
Hint
Stuxnet malware that was designed not just to hijack targeted computers but to actually cause physical damage to equipment controlled by computers