42 questions
What is cybersecurity?
The protection of school property from intruders.
The protection of the internet from lame memes.
The protection of computers systems, networks, data from digital attacks.
The protection of electronic devices.
IoT referes to....
Innovation of Technology
Internet of Things
Imagination of Tyrannosaurus
Images of Technology
Which devices are part of the IoTs
Smart TV
Smart Houses
Smart Students
Smart Thermostats
How do we prevent cyber attacks?
Using same password for every account
Single-factor Authentication
Making our passwords easy to remember
Keeping the computer updated
Using firewalls
What are malwares?
Any program that is harmful for the computer
Computer Cables
Any program that is useful for the computer
A type of IoT
Which of the following are types of Malwares?
Trojan Horses
Memes
Computer Viruses
Ransomwares
True or False:
All hackers are criminals
True
False
What is a white hat hacker?
A good hacker
An evil hacker
What is a black hat hacker?
A good hacker
An evil hacker
What is malware?
Software for males
An abbreviation for malicious stoveware
An abbreviation for malicious software
An abbreviation for malicious hardware
What was Stuxnet?
The first Russian rocket to go into outer space
A malware program that targeted the United State's electric grid
A malware program designed that targeted United States rockets going into out space
A malware program that targeted Iran's nuclear power reactors
What is Cyberwarfare
A system of lasers mounted on aircraft that are used to target enemy aircraft
A system of artillery systems that work together to target enemy units and their vehicles
A malware program designed to penetrate enemy computer systems and networks for a political, economic and military advantage
A malware program designed to penetrate, copy and capture enemy messages
Which of the following are organized attackers of computer systems and networks?
CyberCriminals
hactivists
terrorists
state sponsored terrorists
Non of the above
How would you protect the integrity of a computer system?
Set file permissions
Monitor user access control
Monitor version control of software
Monitor the emails sent to and from your business
Use checksums to ensure that software was not corrupted
What is the best definition for the term Availability?
The word used to describe when computer systems are being well maintained, data is available and you can get the data you stored or were sent
The word used to describe when computer systems are not well maintained, data is available and you can get the data you stored or were sent
The word used to describe when computer systems are being well maintained, data is unavailable and you can get the data you stored or were sent
The word used to describe when computer systems are being well maintained, data is available and you cannot get the data you stored or were sent
What type of security threat starts with a person or group of people within an organization?
Hactivists
Black hat attackers
Insider attackers
White hat attackers
What type of security threat starts with attacks that come from people outside of organization?
Grey hat attacker
White hat attacker
Internal security threat
External security threat
What is the best definition for the term White hat attackers?
International cyber groups designed to bypass a company's security system for political or financial gain.
People or organizations that break into computer networks because they are trying to see if they can bypass a company's security system for political or financial gain.
People or organizations that break into computer networks to exploit system vulnerabilities for illegal personal, financial, or political gain.
People or organizations that break into computer networks to find weaknesses to help improve the company's overall security.
What are the three parts to the CIA Triad?
Confidentiality, Information and Access Control
Confidentiality, Information and Availability
Consistency, Integrity and Availability
Confidentiality, Integrity and Availability
What is another name for confidentiality of information?
Privacy
Accuracy
Consistency
Trustworthiness
What is an example of "hactivism"?
Criminals use the internet to steal money from a bank
A country tries to steal defense secrets from other government networks
A teenager breaks into a web server of a local newspaper and posts a picture of a favorite cartoon character
A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill
What is the purpose of a rootkit?
to deliver advertisements without user consent
to replicate (remake) itself independently of any other programs
to gain access to a device while hiding itself
to pretend it is a legitimate (safe) program
Which two traits describe a worm?
is self-replicating (makes copy of original program)
executes when software is fun on a computer
hides in the computer until it is needed by an attaker
infects computers by attaching to software code
Which example illustrates (shows) how malware might be hidden?
A botnet of zombies carry personal information back to the hacker in hiding
A hacker uses methods to improve the ranking of a website so that users are redirected to a malicious site in hiding
An attack is launched against the public website of an online retailer with the goal of hiding it's response to visitors
An email is sent to employees of an organization with an attachment that looks like an antivirus update, but the attachment actually is hiding spyware
Which type of attack allows a hacker to use a brute force attack?
Password cracking
Social engineering
Denial of service
Packet sniffing
How are zombies used in security attacks?
They are maliciously written code use to replace legitimate software applications
They target specific individuals to gain corporate or personal information
They are infected machines that carry out a DDoS attack
They look through a group of machines for open ports to learn which services are running
What is the most common goal for search engine optimization poisoning?
to trick someone into stalling malware or giving out personal information
To overwhelm a network with maliciously formed packets
to build a botnet of zombies
to increase web traffic to a malicious site.
What is the best definition for the term Buffer Overflow
Data coming into a program with malicious content designed to force the program to behave in an unintended way
When the output of an event depends on ordered or timed outputs
Incorrectly regulating who does what and what they can do with resources
When a malicious application accesses memory allocated to other processes.
Which of the following would be considered to be a weakness in security practices?
Non-validated input
When developers attempt to create their own security applications
Incorrectly regulating who does what and what they can do with resources
When a malicious application accesses memory allocated to other processes
What type of malicious software is designed to automatically perform action, usually online?
Bot
Ransomware
Rootkit
Spyware
What type of malicious software is designed to modify the operating system to create a backdoor to exploit
Spyware
Virus
Rootkit
Worm
What type of malicious software is designed to hold a computer system or it's data captive until a payment is made?
Spyware
Trajan Horse
Scareware
Ransomware
What type of malicious carries out malicious operations under the guise (hidden) of a desired operation?
Trajan Horse
Spyware
Worm
Bot
What type of malicious software is executable that attaches to other files, often legitimate programs?
Spyware
Rootkit
Virus
Worm
What type of malicious software is designed to track a user's activity, often bundled with legitimate software?
Spyware
DoS
Virus
SEO Poisoning
What type of malicious software is designed to persuade the user to take a specific action based on fear?
Adware
Trojan Horse
Zombies
Scareware
What type of malicious software is designed to replicate (make copies) of itself by exploiting vulnerabilities in networks.
Bot
Virus
Zombie
Worm
What type of malicious software is designed to automatically deliver advertisements and is sometimes bundled with other software?
MitMo
Adware
Zombies
DDoS
What type of malicious software is designed to take control over a mobile device (cell phone)
SEO Poisoning
DoS
Spyware
Mitmo
A DoS attack has which characteristics...
Relatively simple to conduct, even by an unskilled attacker
Zombies are controlled by handler systems
Increased traffic to malicious sites that may host malware
When a maliciously formed packet is sent to a host or application and the receiver is unable to handle it
A DDoS attack has which characteristics...
Relatively simple to conduct, even by an unskilled attacker
Comes from multiple, coordinated sources
Zombies are controlled by handler systems
Attacker builds a network of infected hosts, called a botnet
A SEO (Search Engine Optimization) attack has which characteristics...
Originates from multiple, coordinated sources
Make a malicious website appear higher in a search
Attacker builds a network of infected hosts, called a botnet
Increase traffic to malicious sites that may host malware or perform social engineering