Вы находитесь на странице: 1из 7

6/5/2020 Chapter 1 Quiz: Cybersecurity Essentials - EN 0118

Chapter 1 Quiz
Fecha de entrega No hay fecha de entrega Puntos 22 Preguntas 11
Límite de tiempo Ninguno Intentos permitidos Ilimitados

Instrucciones
This quiz covers the content in Cybersecurity Essentials 1.1 Chapter 1. It is designed to provide an
additional opportunity to practice the skills and knowledge presented in the chapter and to help
prepare for the final quiz. You will be allowed multiple attempts and the grade does not appear in the
gradebook.

There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes
can also be deducted for answering incorrectly.
Form 32909

Volver a realizar el examen

Historial de intentos
Intento Hora Puntaje
MÁS RECIENTE Intento 1 4 minutos 4.67 de 22

Entregado el 6 de mayo en 21:16

Pregunta 1 0 / 2 pts

What does the term vulnerability mean?

espuesta correcta a weakness that makes a target susceptible to an attack

a potential threat that a hacker creates

a known target or victim machine

a computer that contains sensitive information

https://82252856.netacad.com/courses/608007/quizzes/5337981 1/7
6/5/2020 Chapter 1 Quiz: Cybersecurity Essentials - EN 0118

Respondido
a method of attack to exploit a target

Refer to curriculum topic: 1.3.1


A vulnerability is not a threat, but it is a weakness that makes
the PC or the software a target for attacks.

Pregunta 2 0 / 2 pts

What is the workforce framework category that includes highly


specialized review and evaluation of incoming cybersecurity
information to determine if it is useful for intelligence?

espuesta correcta
Analyze

Respondido
Protect and Defend

Securely Provision

Oversight and Development

Refer to curriculum topic: 1.5.1


The "Analyze" category of the workforce framework includes
specialty areas responsible for highly specialized review and
evaluation of incoming cybersecurity information to determine its
usefulness.

Pregunta 3 2 / 2 pts

What is an example of an Internet data domain?

https://82252856.netacad.com/courses/608007/quizzes/5337981 2/7
6/5/2020 Chapter 1 Quiz: Cybersecurity Essentials - EN 0118

Cisco

¡Correcto! Linkedin

Juniper

Palo Alto

Refer to curriculum topic: 1.1.1


A data domain is a repository for data.

Pregunta 4 2 / 2 pts

What does the term BYOD represent?

buy your own disaster

bring your own decision

bring your own disaster

¡Correcto! bring your own device

Refer to curriculum topic: 1.4.1


The term bring-your-own-device is used to describe mobile
devices such as iPhones, smartphones, tablets, and other
devices,

Pregunta 5 0.67 / 2 pts

https://82252856.netacad.com/courses/608007/quizzes/5337981 3/7
6/5/2020 Chapter 1 Quiz: Cybersecurity Essentials - EN 0118

Pick three types of records that cyber criminals would be interested in


stealing from organizations. (Choose three.)

food

game

¡Correcto! employment

Respondido flight

¡Correcto! education

espuesta correcta medical

rock

Pregunta 6 0 / 2 pts

What name is given to hackers who hack for a cause?

Respondido hacker

white hat

espuesta correcta hactivist

blue hat

Refer to curriculum topic: 1.2.1


The term is used to describe gray hackers who rally and protect
for a cause.

https://82252856.netacad.com/courses/608007/quizzes/5337981 4/7
6/5/2020 Chapter 1 Quiz: Cybersecurity Essentials - EN 0118

Pregunta 7 0 / 2 pts

Thwarting cyber criminals includes which of the following? (Choose


two.)

Respondido changing operating systems

espuesta correcta sharing cyber Intelligence information

shutting down the network

¡Correcto! establishing early warning systems

hiring hackers

Refer to curriculum topic: 1.2.2


Organization can join efforts to thwart cyber crime by
establishing early warning systems and sharing cyber
intelligence.

Pregunta 8 0 / 2 pts

What type of attack uses many systems to flood the resources of a


target, thus making the target unavailable?

Respondido DoS

spoof

ping sweep

espuesta correcta DDoS

https://82252856.netacad.com/courses/608007/quizzes/5337981 5/7
6/5/2020 Chapter 1 Quiz: Cybersecurity Essentials - EN 0118

Refer to curriculum topic: 1.4.2


DDoS is is an attack that involves multiple systems. DoS
involves only a single attack system.

Pregunta 9 0 / 2 pts

What type of an attack can disable a computer by forcing it to use


memory or by overworking its CPU?

Respondido DDoS

APT

exhaustion

espuesta correcta algorithm

Refer to curriculum topic: 1.4.2


Algorithm attacks can force computers to use memory or
overwork the CPU.

Pregunta 10 0 / 2 pts

What name is given to a amateur hacker?

Respondido black hat

blue team

espuesta correcta script kiddie

https://82252856.netacad.com/courses/608007/quizzes/5337981 6/7
6/5/2020 Chapter 1 Quiz: Cybersecurity Essentials - EN 0118

red hat

Refer to curriculum topic: 1.2.1


Script kiddies is a term used to describe inexperienced hackers.

Pregunta 11 0 / 2 pts

What does the acronym IoE represent?

espuesta correcta Internet of Everything

Respondido
Intelligence on Everything

Internet of Everyday

Insight into Everything

Refer to curriculum topic: 1.1.1


Internet of Everything is the term used for Internet-connected
devices

https://82252856.netacad.com/courses/608007/quizzes/5337981 7/7

Вам также может понравиться