Cybersecurity Essentials Chapter 1 Quiz Questions Answers

Cybersecurity Essentials 1.1 Chapter 1 Quiz Answers Full Questions

Chapter 1: Cybersecurity – A World of Experts and Criminals

1. What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

  • ping sweep
  • DoS
  • spoof
  • DDoS

Explanation: DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

2. What does the term vulnerability mean?

  • a known target or victim machine
  • a weakness that makes a target susceptible to an attack
  • a potential threat that a hacker creates
  • a computer that contains sensitive information
  • a method of attack to exploit a target

Explanation: A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.

3. What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

  • Protect and Defend
  • Securely Provision
  • Oversight and Development
  • Analyze

Explanation: The “Analyze” category of the workforce framework includes specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness.

4. Thwarting cyber criminals includes which of the following? (Choose two.)

  • hiring hackers
  • shutting down the network
  • sharing cyber Intelligence information
  • establishing early warning systems
  • changing operating systems

Explanation: Organization can join efforts to thwart cyber crime by establishing early warning systems and sharing cyber intelligence.

5. What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

  • DDoS
  • exhaustion
  • APT
  • algorithm

Explanation: Algorithm attacks can force computers to use memory or overwork the CPU.

6. Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

  • food
  • rock
  • medical
  • flight
  • game
  • education
  • employment

Explanation: Employment, medical, and education records are important to protect because they contain personal information.

7. What name is given to a amateur hacker?

  • script kiddie
  • blue team
  • red hat
  • black hat

Explanation: Script kiddies is a term used to describe inexperienced hackers.

8. What name is given to hackers who hack for a cause?

  • white hat
  • hactivist
  • hacker
  • blue hat

Explanation: The term is used to describe gray hackers who rally and protect for a cause.

9. What does the term BYOD represent?

  • bring your own decision
  • bring your own disaster
  • buy your own disaster
  • bring your own device

Explanation: The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices

10. What is an example of an Internet data domain?

  • Palo Alto
  • Cisco
  • Juniper
  • Linkedin

Explanation: A data domain is a repository for data.

11. What does the acronym IoE represent?

  • Insight into Everything
  • Internet of Everything
  • Intelligence on Everything
  • Internet of Everyday

Explanation: Internet of Everything is the term used for Internet-connected devices

Notify of

Inline Feedbacks
View all comments
10 months ago

What name is given to a amateur hacker?

8 months ago
Reply to  chaitanya

script Kiddie