CYB 100 Wk 5 – Practice: Knowledge Check

0 items
CYB 100 Wk 5 - Practice: Knowledge Check
CYB 100 Wk 5 – Practice: Knowledge Check
$6.00
  • Description

CYB 100 Wk 5 – Practice: Knowledge Check

  1. Question 1

/ 4

Cyberspace is wholly contained within

 

The information environment

The logical network

All networked computers

The internet

  1. Question 2

/ 4

National cybersecurity is challenging because threats

 

Mostly happen inside national borders

Are almost always international

Usually originate from other nations

Do not abide to national borders

  1. Question 3

/ 4

Why is it sometimes difficult to determine if computer problems are due to cyberattack?

 

Computer problems are never caused by cyberattack.

Cyber criminal activities are nearly impossible to detect.

Cyberattacks are never aimed at disrupting hardware.

Computer malfunctions can be the cause of problems.

  1. Question 4

/ 4

Governance of the Internet is challenging the sovereign rights of states because international law

 

Is only relevant in some cases

Is irrelevant in cyberspace

Recognizes legal and physical control

Recognizes U.S. laws over other states

  1. Question 5

/ 4

Which is a reason IoT devices are a point of weakness in the cybersecurity landscape?

 

The open source software often used in IoT devices cannot be updated.

IoT devices cannot use two-factor authentication.

IoT devices’ security vulnerabilities are not easily patched.

IoT devices do not require the same kind of security.

  1. Question 6

/ 4

This is known as an ecosystem of connected sensors attached to everyday devices and appliances:

 

IoT

AI

TOR

AoT

  1. Question 7

/ 4

Which of these is the condition of being free from observation or disruption by other people?

 

Patience

Politics

Privacy

Policies

  1. Question 8

/ 4

Which one of the domestic security services groups below is not continuously being monitored in cyberspace?

 

Spies

Admins

Terrorists

Criminals

  1. Question 9

/ 4

Which of the following may be considered the most challenging part of cybersecurity?

 

Hardware

Malware

Viruses

Humans

  1. Question 10

/ 4

Which of these is a challenge created by the fast pace of technological changes?

 

Laws and policies don’t keep the pace of the technological changes.

Laws and policies constrict the pace of technological changes.

Laws and policies change faster than technology.

Laws and policies have no influence on technological changes