CYB 100 Wk 4 – Practice: Knowledge Check

0 items
CYB 100 Wk 4 - Practice: Knowledge Check
CYB 100 Wk 4 – Practice: Knowledge Check
$6.00
  • Description

CYB 100 Wk 4 – Practice: Knowledge Check

  1. Question 1

/ 4

Which of the following explains the relationship between persons and cyber personas?

 

Each person can have many cyber personas

Correct answer

Cyber personas are always fake, not real persons

There is no difference between a person and a cyber persona

  1. Incorrect:

Each person can have only one cyber persona

  1. Question 2

/ 4

The cyber-persona layer represents an abstraction of which other layer(s) that develop a digital representation of an individual or entity identity in cyberspace?

 

Physical-network layer

Logical layer

Correct answer

Physical layer

Application layer

  1. Question 3

/ 4

One of these items is NOT related to cyber trespassing:

 

Viruses

Correct answer

Destruction

Alteration

Deletion

  1. Question 4

/ 4

Hacktivism commonly revolves around a variety of techniques meant to do what to the operational status of servers or computers?

 

Restore

Backup

Save

Disrupt

Correct answer

  1. Question 5

/ 4

This group constitutes the largest and most substantial threat to cybersecurity:

 

Script Kiddies

Criminal Actors

Correct answer

Phishers

Hacktivist

  1. Question 6

/ 4

Why might phishing be a concern for organizations?

 

Workers expect their organizations to protect themselves.

Workers trained on basic security can still be fooled into clicking a phishing link.

Correct answer

Organizations allow all emails into their networks without protections.

Organizations largely neglect to train their workers to recognize phishing scams.

  1. Question 7

/ 4

Which of these is the primary means by which criminals manipulate human users?

 

Deception

Correct answer

Attacks

Fraud

Theft

  1. Question 8

/ 4

Which of these is an anonymization technique to protect individuals’ online personas?

 

ROT

MAC

ISP

Tor

Correct answer

  1. Question 9

/ 4

The use of a false cyber-persona may be appropriate when

 

The other parties do not know it is a false cyber-persona

All other cyber-personas are false too

Participating in a virtual community or game

Correct answer

It’s on behalf of human rights

  1. Question 10

/ 4

The cyber-persona layer of cyberspace includes which of the following components?

 

Digital identity

Correct answer

Software

Geographical

Internet protocols