Introduction to Cybersecurity 2.1 Chapter 1 Quiz Simulator Online
ITC 2.1 Chapter 1 Quiz Simulator Online | |
---|---|
Time | 60 minutes |
Questions | 10 |
SHOW ANSWERS |
Leaderboard: ITC v2.1 Chapter 1 Quiz Simulator
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
ITC v2.1 Chapter 1 Quiz Simulator
Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
ITC v2.1 Chapter 1 Quiz Simulator
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
3 pointsWhat three items are components of the CIA triad? (Choose three.)
Correct
Incorrect
Hint
Explanation:
The CIA triad contains three components: confidentiality, integrity, and availability. It is a guideline for information security for an organization.
-
Question 2 of 10
2. Question
1 pointsWhat is another name for confidentiality of information?
Correct
Incorrect
Hint
Explanation:
Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.
-
Question 3 of 10
3. Question
1 pointsWhich statement describes cyberwarfare?
Correct
Incorrect
Hint
Explanation:
Cyberwarfare is Internet-based conflict that involves the penetration of the networks and computer systems of other nations. Organized hackers are typically involved in such an attack.
-
Question 4 of 10
4. Question
1 pointsWhat is an example of “hacktivism”?
Correct
Incorrect
Hint
Explanation:
Hacktivism is a term used to describe cyberattacks carried out by people who are considered political or ideological extremists. Hacktivists attack people or organizations that they believe are enemies to the hacktivist agenda.
-
Question 5 of 10
5. Question
1 pointsWhat is the motivation of a white hat attacker?
Correct
Incorrect
Hint
Explanation:
White hat attackers break into networks or computer systems in order to discover weaknesses for the purpose of improving the security of these systems. These break-ins are done with permission from the owner or the organization. Any results are reported back to the owner or the organization.
-
Question 6 of 10
6. Question
1 pointsWhich method is used to check the integrity of data?
Correct
Incorrect
Hint
Explanation:
A checksum value of a block of data is calculated and transmitted with the data. After the data is received, the checksum hashing is performed again. The calculated value is compared with the transmitted value to verify the integrity of the data.
-
Question 7 of 10
7. Question
1 pointsFill in the blank.
- The individual user profile on a social network site is an example of a/an (online, ONLINE, Online) identity.
Correct
Incorrect
-
Question 8 of 10
8. Question
3 pointsMatch the type of cyber attackers to the description. (Not all options are used.)
Sort elements
- state-sponsored attackers
- terrorists
- hacktivists
-
gather intelligence or commit sabotage on specific goals on behalf of their government
-
make political statements, or create fear, by causing physical or psychological damage to victims
-
make political statements in order to create an awareness of issues that are important to them
Correct
Incorrect
-
Question 9 of 10
9. Question
3 pointsWhat are three methods that can be used to ensure confidentiality of information? (Choose three.)
Correct
Incorrect
Hint
Explanation:
Methods including data encryption, username ID and password, and two factor authentication can be used to help ensure confidentiality of information. File permission control, version control, and backup are methods that can be used to help ensure integrity of information.
-
Question 10 of 10
10. Question
1 pointsWhat is a reason that internal security threats might cause greater damage to an organization than external security threats?
Correct
Incorrect
Hint
Explanation:
Internal threats have the potential to cause greater damage than external threats because internal users have direct access to the building and its infrastructure devices. Internal users may not have better hacking skills than external attackers. Both internal users and external users can access the network devices through the Internet. A well designed security implementation should require authentication before corporate data is accessed, regardless of whether the access request is from within the corporate campus or from the outside network.