- Description
CYB 100 Wk 1 – Practice: Knowledge Check
- Question 1
/ 4
The Open Systems Interconnection (OSI) model has how many layers?
7
3
5
2
- Question 2
Which protocol is used to allow users to access the Internet?
Hypertext Transfer Protocol or HTTP
File Transfer Protocol or FTP
Peer to peer networking or P2P
Transmission control protocol/Internet protocol or TCP/IP
- Question 3
/ 4
Which of these components is NOT part of the physical-network layer of cyberspace?
Policies
Modems
Cables
Routers
- Question 4
/ 4
The cyber-persona layer of cyberspace includes which of the following components?
Digital identity
Geographical
Software
Internet protocols
- Question 5
/ 4
Cybersecurity threats are a problem that is
Growing
Shrinking
Staying the same
Not really a problem
- Question 6
The logical network layer of cyberspace includes which of the following components?
Firmware
People
Computers
Digital identity
- Question 7
/ 4
Visiting a website includes these two layers of the OSI model working together:
Physical and data link
Transport and session
Physical and presentation
The logical and cyber persona
- Question 8
/ 4
Why is anonymization a challenge of cybersecurity?
It protects users’ identity and obscures criminals’ identity.
Users and criminals should never be anonymous.
Criminals identity is anonymous, but users are not.
Governments do not want anonymization.
- Question 9
/ 4
Select layers of cyberspace according to the U.S. Department of Defense.
Physical-network, logical, and cyber-persona
Data, devices, and people
Hardware, software, and information
Physical, transport, and application
- Question 10
/ 4
Most of the support behind the development of early computer networks came from the U.S. DoD and which of the following?
Advanced Research Projects Agency (ARPA)
National Security Agency (NSA)
Department of Health and Human Services (HHS)
Department of Justice (DoJ)