A) red hats
B) black hats
C) white hats
D) green hats
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Hackers are evil people.
B) Security is not about security.
C) The greatest damages are caused by simple failures.
D) Most hackers use weak points to get access.
Correct Answer
verified
Multiple Choice
A) denial-of-service attacks
B) worms
C) phishing
D) spamming
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) foreign governments
B) spies
C) insiders
D) hacktivists
Correct Answer
verified
Multiple Choice
A) vishing
B) phishing
C) spam
D) impersonation
Correct Answer
verified
Multiple Choice
A) black hats
B) gray hats
C) white hats
D) green hats
Correct Answer
verified
Multiple Choice
A) nation-states hacking or spying on trade and other secret information
B) advanced hackers aiming at large corporations
C) hacking or spying on city and local governments
D) terrorists looking to identify and exploit vulnerabilities in our infrastructures
Correct Answer
verified
Multiple Choice
A) decrypt your phone calls and text messages
B) encrypt your hard drive
C) use a password manager
D) use two-factor identification
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cyberwarfare
B) cyberbullying
C) cyberterrorism
D) cyberespionage
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) malicious
B) exploited
C) careless
D) feared
Correct Answer
verified
Multiple Choice
A) malicious
B) careless
C) exploited
D) feared
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) individual
B) local
C) national
D) international
Correct Answer
verified
Multiple Choice
A) red hats
B) white hats
C) black hats
D) green hats
Correct Answer
verified
Multiple Choice
A) cyberthreat
B) cyberwarfare
C) cybersecurity
D) cyberattack
Correct Answer
verified
Showing 21 - 40 of 40
Related Exams