Cybersecurity Final

Description

Computer Science Quiz on Cybersecurity Final, created by Kayla Gadsden on 21/04/2021.
Kayla Gadsden
Quiz by Kayla Gadsden, updated more than 1 year ago
Kayla Gadsden
Created by Kayla Gadsden almost 5 years ago
0
0

Resource summary

Question 1

Question
Computer forensics is currently integrated as a vital part of the justice system.
Answer
  • True
  • False

Question 2

Question
In what order are the five main characteristics of computer forensics executed?
Answer
  • Identification, Preservation, Analysis, Documentation, Presentation
  • Preservation, Documentation, Identification, Analysis, Presentation
  • Documentation, Identification, Preservation, Analysis, Presentation
  • Presentation, Documentation, Analysis, Preservation, Identification

Question 3

Question
[blank_start]Sealing[blank_end] is usually the first step in preserving digital evidence
Answer
  • Sealing

Question 4

Question
Data and privacy security are the same thing?
Answer
  • True
  • False

Question 5

Question
How can you protect your privacy?
Answer
  • Anti-virus software
  • Software updates
  • Two-factor authentication
  • All of the above

Question 6

Question
Privacy can be attacked if the passwords of accounts are [blank_start]weak[blank_end] and [blank_start]simple[blank_end].
Answer
  • weak
  • simple

Question 7

Question
You have a role in Cyber Security aspects of Cyberwarfare?
Answer
  • True
  • False

Question 8

Question
Which one of the choices is NOT one of the three layers of Cyberspace?
Answer
  • Physical Network Layer
  • Logical Network Layer
  • Social Network Layer
  • Cyber-Persona Layer

Question 9

Question
What are some ways to combat cyber warfare-related threats?
Answer
  • Tokens
  • System controlled by software
  • Human interaction

Question 10

Question
Cybersecurity in healthcare involves the protection of electronic information and assets from unauthorized access, use, and disclosure of [blank_start]PHI[blank_end] and [blank_start]PII[blank_end].
Answer
  • PII
  • PHI

Question 11

Question
Cybersecurity in healthcare is important for protecting patient safety and privacy
Answer
  • True
  • False

Question 12

Question
What issue accounts for nearly one-third of healthcare data breaches?
Answer
  • Employee Error
  • Encryption Blind Spots
  • Phishing Attacks
  • Misleading Websites

Question 13

Question
Mobile Security is the protection of [blank_start]smartphones[blank_end], [blank_start]tablets[blank_end], [blank_start]laptops[blank_end], and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
Answer
  • smartphones
  • tablets
  • laptops
  • smartphones
  • tablets
  • laptops
  • smartphones
  • laptops
  • tablets

Question 14

Question
What is one way to keep your mobile devices locked?
Answer
  • Pin
  • Password
  • Pattern
  • Biometrics

Question 15

Question
Free public WIFI is safe to use
Answer
  • True
  • False

Question 16

Question
[blank_start]Physical[blank_end] and [blank_start]Behavioral[blank_end] are the two main types of Biometric Identifiers
Answer
  • Physical
  • Behavioral

Question 17

Question
Who invented the classification system for fingerprints?
Answer
  • Vint Cerf
  • Sir Francis Galton
  • Bob Kahn
  • Sir Tim Berners-Lee

Question 18

Question
Which of the following is not a Behavioral Identifier?
Answer
  • Facial recognition
  • Typing pattern
  • Walking gait
  • Physical gestures

Question 19

Question
Please select the most effective attacks employed by hackers when targeting an organization.
Answer
  • Spear-phishing
  • Worms
  • Watering hole attacks
  • Trojan Horses

Question 20

Question
What percentage of security breaches are caused by human error?
Answer
  • 79%
  • 48%
  • 76%
  • 95%

Question 21

Question
Fill in the Blank A. Builds understanding of risks and provides necessary steps to mitigate them B. Password policies, multi-factor authentication, and mobile device management C. Completion of required training, policy compliance, etc. D. Being aware and prepared E. Exhibiting habits based on strong security guidelines
Answer
  • D
  • C
  • B
  • E
  • A

Question 22

Question
Blockchains use ____ to secure the blocks in the chain and store the ____ of the previous block to prevent tampering.
Answer
  • Hasing, hash
  • Salting, salt
  • Encryption, data
  • Ledgers, ledger

Question 23

Question
[blank_start]Mining[blank_end] is the process of finding the next block in the chain
Answer
  • Mining

Question 24

Question
Each block in a chain contains a unique hash that is unrelated to the previous block in the chain
Answer
  • True
  • False

Question 25

Question
By storing resources in "the cloud", users can____
Answer
  • Increase performance
  • Save Costs
  • Increase speed

Question 26

Question
What is the most widely used type of cloud?
Answer
  • Hybrid
  • Public
  • Private

Question 27

Question
How is "the cloud" made more secure?
Answer
  • Good organization
  • Unchecked authority
  • No privacy control

Question 28

Question
A firewall is a [blank_start]tool[blank_end] used to [blank_start]monitor[blank_end] and [blank_start]filter[blank_end] network [blank_start]traffic[blank_end].
Answer
  • tool
  • monitor
  • filter
  • traffic

Question 29

Question
What are the different types of firewalls?
Answer
  • Host-based
  • GPU-based
  • Network-based
  • Router-based

Question 30

Question
What are the benefits/uses of a VPN?
Answer
  • better security
  • remote access
  • privacy

Question 31

Question
[blank_start]PPTP[blank_end], [blank_start]L2TP[blank_end], [blank_start]SSTP[blank_end], and [blank_start]OpenVPN[blank_end] are just some VPN protocols?
Answer
  • PPTP
  • L2TP
  • SSTP
  • OpenVPN

Question 32

Question
HIPPA contains two rules: HIPPA [blank_start]Privacy[blank_end] Rule and HIPPA [blank_start]Security[blank_end] Rule.
Answer
  • Privacy
  • Security

Question 33

Question
HIPPA requires [blank_start]regulations[blank_end] protecting the [blank_start]privacy[blank_end] and [blank_start]security[blank_end] of certain [blank_start]health information[blank_end].
Answer
  • regulations
  • privacy
  • security
  • health information

Question 34

Question
[blank_start]HTTP[blank_end], [blank_start]DNS[blank_end], and [blank_start]TCP/IP[blank_end] are all examples of application layer protocols.
Answer
  • HTTP
  • DNS
  • TCP/IP

Question 35

Question
What are HTTP Response Codes?
Answer
  • 128
  • 200
  • 400
  • 500

Question 36

Question
Mandatory access control (MAC) is a security strategy that restricts the ability individual resource owners have to grant or deny access to resource objects in a file system.
Answer
  • True
  • False

Question 37

Question
The Principle of Least Privilege means subjects only have access to objects necessary to complete job
Answer
  • True
  • False
Show full summary Hide full summary

Similar

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr