Introduction to Cybersecurity (CISCO)

IT6205A-2113T Introduction to Cybersecurity Introduction
(Chapter 1)

 


Question text

What is another name for confidentiality of information?
Select one:
trustworthiness
privacy
accuracy
consistency

Feedback

Question text

Match the type of cyber attackers to the description. (Not all options are used.)
gather intelligence or commit sabotage on specific goals on behalf of their government 
make political statements, or create fear, by causing physical or psychological damage to victims 
make political statements in order to create an awareness of issues that are important to them 

Feedback

Question text

Which method is used to check the integrity of data?
Select one:
encryption
authentication
backup
checksum

Feedback

Question text

Which statement describes cyberwarfare?
Select one:
It is simulation software for Air Force pilots that allows them to practice under a simulated war scenario.
Cyberwarfare is an attack carried out by a group of script kiddies.
It is Internet-based conflict that involves the penetration of information systems of other nations.
It is a series of personal protective equipment developed for soldiers involved in nuclear war.

Feedback

Question text

What is the motivation of a white hat attacker?
Select one:
discovering weaknesses of networks and systems to improve the security level of these systems
fine tuning network devices to improve their performance and efficiency
taking advantage of any vulnerability for illegal personal gain
studying operating systems of various platforms to develop a new system

Feedback

Question text

What three items are components of the CIA triad? (Choose three.)
Select one or more:
availability
integrity
intervention
scalability
confidentiality
access

Feedback

Question text

What is a reason that internal security threats might cause greater damage to an organization than external security threats?
Select one:
Internal users have direct access to the infrastructure devices.
Internal users can access the infrastructure devices through the Internet.
Internal users have better hacking skills.
Internal users can access the corporate data without authentication.

Feedback

Question text

What is an example of "hacktivism"?
Select one:
Criminals use the Internet to attempt to steal money from a banking company.
A country tries to steal defense secrets from another country by infiltrating government networks.
A teenager breaks into the web server of a local newspaper and posts a picture of a favorite cartoon character.
A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.

Feedback

Question text

What are three methods that can be used to ensure confidentiality of information? (Choose three.)
Select one or more:
version control
backup
data encryption
username ID and password
two factor authentication
file permission settings

Feedback