- Description
CYB 100 Wk 4 – Practice: Knowledge Check
- Question 1
/ 4
Which of the following explains the relationship between persons and cyber personas?
Each person can have many cyber personas
Correct answer
Cyber personas are always fake, not real persons
There is no difference between a person and a cyber persona
- Incorrect:
Each person can have only one cyber persona
- Question 2
/ 4
The cyber-persona layer represents an abstraction of which other layer(s) that develop a digital representation of an individual or entity identity in cyberspace?
Physical-network layer
Logical layer
Correct answer
Physical layer
Application layer
- Question 3
/ 4
One of these items is NOT related to cyber trespassing:
Viruses
Correct answer
Destruction
Alteration
Deletion
- Question 4
/ 4
Hacktivism commonly revolves around a variety of techniques meant to do what to the operational status of servers or computers?
Restore
Backup
Save
Disrupt
Correct answer
- Question 5
/ 4
This group constitutes the largest and most substantial threat to cybersecurity:
Script Kiddies
Criminal Actors
Correct answer
Phishers
Hacktivist
- Question 6
/ 4
Why might phishing be a concern for organizations?
Workers expect their organizations to protect themselves.
Workers trained on basic security can still be fooled into clicking a phishing link.
Correct answer
Organizations allow all emails into their networks without protections.
Organizations largely neglect to train their workers to recognize phishing scams.
- Question 7
/ 4
Which of these is the primary means by which criminals manipulate human users?
Deception
Correct answer
Attacks
Fraud
Theft
- Question 8
/ 4
Which of these is an anonymization technique to protect individuals’ online personas?
ROT
MAC
ISP
Tor
Correct answer
- Question 9
/ 4
The use of a false cyber-persona may be appropriate when
The other parties do not know it is a false cyber-persona
All other cyber-personas are false too
Participating in a virtual community or game
Correct answer
It’s on behalf of human rights
- Question 10
/ 4
The cyber-persona layer of cyberspace includes which of the following components?
Digital identity
Correct answer
Software
Geographical
Internet protocols