Cybersecurity Essentials 1.13 – CE – Chapter 1 Quiz Answers

  1. What name is given to hackers who hack for a cause?

    • hactivist
    • hacker
    • white hat
    • blue hat

      Answers Explanation & Hints:

      The term is used to describe gray hackers who rally and protect for a cause.

  2. What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

    • Analyze
    • Protect and Defend
    • Securely Provision
    • Oversight and Development

      Answers Explanation & Hints:

      The “Analyze” category of the workforce framework includes specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness.

  3. What does the term BYOD represent?

    • bring your own disaster
    • bring your own decision
    • bring your own device
    • buy your own disaster

      Answers Explanation & Hints:

      The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices, 

  4. What does the term vulnerability mean?

    • a computer that contains sensitive information
    • a known target or victim machine
    • a method of attack to exploit a target
    • a weakness that makes a target susceptible to an attack
    • a potential threat that a hacker creates

      Answers Explanation & Hints:

      A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.

  5. What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

    • APT
    • DDoS
    • exhaustion
    • algorithm

      Answers Explanation & Hints:

      Algorithm attacks can force computers to use memory or overwork the CPU.

  6. What name is given to a amateur hacker?

    • script kiddie
    • blue team
    • black hat
    • red hat

      Answers Explanation & Hints:

      Script kiddies is a term used to describe inexperienced hackers.

  7. Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

    • flight
    • food
    • game
    • employment
    • rock
    • medical
    • education

      Answers Explanation & Hints:

      The correct answers are: medical, education, employment

  8. What is an example of an Internet data domain?

    • Linkedin
    • Juniper
    • Palo Alto
    • Cisco

      Answers Explanation & Hints:

      A data domain is a repository for data.

  9. What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

    • DoS
    • ping sweep
    • spoof
    • DDoS

      Answers Explanation & Hints:

      DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

  10. Thwarting cyber criminals includes which of the following? (Choose two.)

    • hiring hackers
    • sharing cyber Intelligence information
    • shutting down the network
    • changing operating systems
    • establishing early warning systems

      Answers Explanation & Hints:

      Organization can join efforts to thwart cyber crime by establishing early warning systems and sharing cyber intelligence.

  11. What does the acronym IoE represent?

    • Internet of Everyday
    • Internet of Everything
    • Intelligence on Everything
    • Insight into Everything

      Answers Explanation & Hints:

      Internet of Everything is the term used for Internet-connected devices

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments