CISCO INTRODUCTION TO CYBERSCURITY CHAPTER 1 QUIZ 1 SOLUTION






 Match the type of cyber attackers to the description. (Not all options are used.)

A)
make political statements in order to create an awareness of issues that are important to them
                                                                                                                  HACKVISTIS
B)
make political statements in order to create an awareness of issues that are important to them
                                                                                                                STATE SPONSERD ATTACKERS
C) 
make political statements, or create fear, by causing physical or psychological damage to victims
                                                                                                                         TERORIST

What three items are components of the CIA triad? (Choose three.)

A) scalability
B)confidentiality
C)integrity
D)intervention
E)availability
F)access


Which statement describes cyberwarfare?

        Cyberwarfare is an attack carried out by a group of script kiddies.
It is simulation software for Air Force pilots that allows them to practice under a simulated war scenario.
It is a series of personal protective equipment developed for soldiers involved in nuclear war.
It is Internet-based conflict that involves the penetration of information systems of other nations.



What is an example of "hacktivism"?

         privacy
trustworthiness
consistency
accuracy




























































What is the motivation of a white hat attacker?

discovering weaknesses of networks and systems to improve the security level of these systems
taking advantage of any vulnerability for illegal personal gain
fine tuning network devices to improve their performance and efficiency
studying operating systems of various platforms to develop a new system

What are three methods that can be used to ensure confidentiality of information? (Choose three.)

backup
username ID and password
file permission settings
data encryption
two factor authentication
version control








Which method is used to check the integrity of data?
        authentication
encryption
backup
checksum


What is a reason that internal security threats might cause greater damage to an organization than external security threats?

        Internal users have better hacking skills.
Internal users have direct access to the infrastructure devices.
Internal users can access the corporate data without authentication.
Internal users can access the infrastructure devices through the Internet.

































































Post a Comment (0)
Previous Question Next Question

You might like