No student devices needed. Know more
30 questions
Traces the stages of a cyber-attack, identifies vulnerabilities, and helps security teams to stop the attacks
Kill Chain
Threat Modeling
Cyber Security Model
CIA Triad
Cybersecurity is the protection of computer systems, networks, and data from...
Physical devices, vehicles, home appliances, and other items embedded with software and sensors which are connected and exchange data is referred to...
Internet of Things
Cyber Exchange
White Hats
Social Engineering
Which of the following is not true about cybersecurity?
Recent data breaches have released personal information of hundreds of millions of people.
Cybersecurity is the protection of computer systems, networks, and data from digital attacks.
As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.
Cyber attacks can devastate large organizations, but individuals are largely unaffected.
The majority of system "hacks" occur primarily due to which of the following?
Human Error
Open Router Ports
Inexpensive Network Security Software
Expired Security Certificates
Which of the following is true about the Internet of Things?
I. The Internet of Things is the network of devices with the ability to connect and exchange data.
II. The Internet of Things increases our vulnerability to cyber attacks.
III. The Internet of Things is purely positive–there are no negative consequences to increased connectivity
I only
I and II
I and III
None of the above
In regard to the CIA Triad, what is the opposite of Integrity?
Disclosure
Alteration
Diversion
Destruction
Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99.
Which part of the CIA triad has been broken?
Confidentiality
Integrity
Availability
The image represents what type of cyber attack?
Spyware
Scareware
Spam
Baiting
This type of attack is the practice of sending fraudulent communications that appear to come from a reputable source.
Malware
Viruses
Phishing
Spam
This type of attack floods systems, servers, or networks with traffic to exhaust hardware resources and bandwidth.
SQL Injection
Distributed Denial of Service
Malware
Vishing
What does a ransomware hacker do when they gain access to a user’s system?
Encrypt important files
Delete key system data
Copy a users personal data
Move operating system data
A deceptive email is typically used in a phishing attack. Which of the following is most likely a legitimate email address?
jacob@homedepot23.com
nathaniel@paypal.info1.com
mikayla@applle.com
jamal@netflix.com
Most cyber attacks occur because of which of the following?
Human Mistakes
A security bug
Poor quality software
Poor firewall set up
Which one of the following is not a method for preventing cyberattacks?
Use strong passwords
Install software updates often
Use multi-factor authentication
Use wireless internet only
Which of the following offers the BEST way to improve the security of your online accounts?
Long Passwords
Passwords with multiple characters
Multi-factor authentication
Changing your password every 3 months
Cyber attacks using a variety of malicious online activity tactics that exploits human psychology is considered...
Social Engineering
Cyber Infusion
Data Breaching
Cryptanalysis
An automated cyber attack where trying different combinations of usernames and password until attackers find one that works.
Brute Forcing
Social Engineering
Phishing
Baiting
List 3 items that are considered 'sensitive' PII.
Tricking people into breaking normal security rules and procedures and/or divulging personal information.
Social Engineering
Cryptography
Two-Factor Authentication
Ransomware
Subversive use of computer systems to promote a political/social agenda.
Hactivist
Industrial Spies
Nation State Hacker
Botnet
A malicious file that can attach to other files and replicate when the user shares the file.
Virus
Worm
Trojan
DDOS
A malicious program that pretends to be benign/normal.
Trojan
Virus
DDOS
Worm
Which of the following is NOT a primary way cyber criminals exploit vulnerabilities?
Software not being updated
Security Updates not promptly installed
Visiting Unsecured websites
Phishing
Improperly logging off a device
List at least 3 ways companies can prevent cyber attacks?
The practice of encoding information so only authorized people can read it.
Cyber Analysis
Threat Modeling
Cryptography
Cyber Kill Chain Modeling
List 2 ways that we minimize our chances from a brute force attack.
In the Kill Chain, the attacker takes advantage of the victim’s system and entices the victim to accept the email, link or message.
Reconnaissance
Command & Control
Exploitation
Weaponization
What type of attack uses a list of popular words & symbols, or passwords from past data breaches?
Dictionary Attack
Brute Force Attack
Malware Attack
Vishing Attack
Using redundant systems or back ups focuses on which part of the CIA Triad?
Destruction
Integrity
Availability
Confidentiality
Explore all questions with a free account