Filters
Question type

Study Flashcards

Hackers who are motivated by personal gain or a certain cause are often referred to as ______.


A) red hats
B) black hats
C) white hats
D) green hats

Correct Answer

verifed

verified

Using two-factor identification is recommended for protecting private information, such as using a password and a fingerprint or other physical device.

Correct Answer

verifed

verified

Identify and discuss the three main types of insider threats.

Correct Answer

verifed

verified

A strong answer will include the followi...

View Answer

Which of the following laws does not apply to hackers?


A) Hackers are evil people.
B) Security is not about security.
C) The greatest damages are caused by simple failures.
D) Most hackers use weak points to get access.

Correct Answer

verifed

verified

Cyber terrorism attacks often take the form of ______.


A) denial-of-service attacks
B) worms
C) phishing
D) spamming

Correct Answer

verifed

verified

National threats originate from individuals inside the United States, aiming to attack local or national governments and infrastructures.

Correct Answer

verifed

verified

According to national surveys, ______ are the second greatest threat to a company's cybersecurity, only trumped by hackers.


A) foreign governments
B) spies
C) insiders
D) hacktivists

Correct Answer

verifed

verified

All of the following are examples of social engineering except ______.


A) vishing
B) phishing
C) spam
D) impersonation

Correct Answer

verifed

verified

Hackers who are motivated by financial gains and who conduct both bad and ethical hacking are referred to as ______.


A) black hats
B) gray hats
C) white hats
D) green hats

Correct Answer

verifed

verified

Which of the following was NOT identified as one of the main forms of international threats?


A) nation-states hacking or spying on trade and other secret information
B) advanced hackers aiming at large corporations
C) hacking or spying on city and local governments
D) terrorists looking to identify and exploit vulnerabilities in our infrastructures

Correct Answer

verifed

verified

Edward Snowden, an American computer professional, provided all of the following tips for keeping data private except ______.


A) decrypt your phone calls and text messages
B) encrypt your hard drive
C) use a password manager
D) use two-factor identification

Correct Answer

verifed

verified

The negative connotation of the word hacker could be defined as "a malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term for this sense is cracker."

Correct Answer

verifed

verified

The use of computer networks and technologies as a means for conducting attacks that target critical national infrastructures or governmental assets has a psychological, social, political, or religious motive, causes harm to individuals or groups, or physically damages infrastructures is referred to as ______.


A) cyberwarfare
B) cyberbullying
C) cyberterrorism
D) cyberespionage

Correct Answer

verifed

verified

Identify and discuss the four tips for protecting private information that were provided by Edward Snowden. Can you think of any others? If so, which ones?

Correct Answer

verifed

verified

A strong answer will include the followi...

View Answer

Which of the following is NOT considered a main type of insider threat?


A) malicious
B) exploited
C) careless
D) feared

Correct Answer

verifed

verified

The least common but most costly is ______ insider threat.


A) malicious
B) careless
C) exploited
D) feared

Correct Answer

verifed

verified

International threats are those that originate from inside the company or organization.

Correct Answer

verifed

verified

Threats to cybersecurity originate from all of the following sources except ______.


A) individual
B) local
C) national
D) international

Correct Answer

verifed

verified

The "bad guy" hackers are known as ______.


A) red hats
B) white hats
C) black hats
D) green hats

Correct Answer

verifed

verified

A ______ refers to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway.


A) cyberthreat
B) cyberwarfare
C) cybersecurity
D) cyberattack

Correct Answer

verifed

verified

Showing 21 - 40 of 40

Related Exams

Show Answer