Cyber Quiz

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

If a school website’s lunch menu is modified without authorization (e.g., to “Green Eggs and Ham”), which part of the CIA triad is broken?

A. Confidentiality
B. Integrity
C. Availability
D. All of the above

Integrity

2
New cards

Which of the following statements are true?

A. There has been a decrease in the number of cyber attacks in the past decade.
B. Cybersecurity is the protection of computer systems, networks, and data from digital attacks.
C. Cyber attacks in the past few years have impacted individuals, governments, and organizations.

Choices:

  1. A only
  2. B only
  3. B and C
  4. A, B and C

B and C

3
New cards

Which of the following most accurately describes the Internet of Things?

A. Malicious hackers intent on stealing confidential information like credit card numbers or email addresses
B. All of the websites that a person can currently access online
C. Internet service providers who make it possible to go online
D. The network of devices with the ability to connect and exchange data

The network of devices with the ability to connect and exchange data

4
New cards

Robert is on an online auction site trying to make a bid on a new computer. As he tries to make a bid, the site crashes and he loses the auction.
Which part of the CIA triad was broken?

A. Confidentiality
B. Integrity
C. Availability
D. All of the above

Availability

5
New cards

Alice is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Bob gets on the computer after her, and he sees her grades for all of her classes.
Which part of the CIA triad was broken?

A. Confidentiality
B. Integrity
C. Availability
D. All of the above

Confidentiality

6
New cards

Which of the following devices is not a part of the Internet of Things?

A. A watch that allows you to measure and track your activity through a mobile app
B. A security system that lets you remotely monitor your home
C. A physical combination padlock for your gym locker
D. A car with a built-in navigation system

A physical combination padlock for your gym locker

7
New cards

Which of the following is true of the WannaCry ransomware attack?

A. Hackers locked down computers and demanded payment to unlock
B. Medical services were disrupted as a result of the attack
C. The attack may have been possible because people had not updated their operating systems
D. All of the above are true

All of the above are true

8
New cards

Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary.
Which part of the CIA triad was broken?

A. Confidentiality
B. Integrity
C. Availability
D. All of the above

Confidentiality

9
New cards

What should be the primary focus of keeping information secure?

A. Educating users on the dangers of phishing attempts
B. Encrypting all personal data
C. Ensuring the confidentiality, integrity, and availability of data
D. Implementing a strong password policy

Ensuring the confidentiality, integrity, and availability of data

10
New cards

What is comprised of millions of smart devices and sensors connected to the internet?

A. the cloud
B. the data center
C. the internet of things
D. the CIA triad

the internet of things

11
New cards

What is the main fear that ransomware attacks center around?

A. Fear of hackers
B. Fear of the Internet
C. Fear of being spied on
D. Fear of losing important files

Fear of losing important files

12
New cards

What does a ransomware hacker do when they gain access to a user’s system?

A. Encrypt important files
B. Delete key system data
C. Copy a users personal data
D. Move operating system data

Encrypt important files

13
New cards

What is the core technology that allows digital devices to connect and transmit data with each other?

A. sensors
B. networks
C. smart phones
D. a global positioning sensor or GPS

networks

14
New cards

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email?

A. Knowing your full name
B. Knowing your hobbies
C. Knowing a recent store that you shopped at
D. Knowing your address

Knowing a recent store that you shopped at

15
New cards

A deceptive email is typically used in a phishing attack. Which of the following is most likely a legitimate email address?

A. jacob@homedepot23.com
B. nathaniel@paypal.info1.com
C. mikayla@applle.com
D. jamal@netflix.com

jamal@netflix.com