Please answer the following questions.
Cybersecurity Final Exam
Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
A _________________ is a computer program that purports to do one thing but actually takes other unseen and malicious actions behind the scenes.
CorrectIncorrect -
Question 2 of 10
2. Question
___________ is defined as any identified effort directed towards access to, exfiltration, manipulation of, or impairment to the integrity, confidentiality, security, or availability of data, or a federal system, without lawful authority.
CorrectIncorrect -
Question 3 of 10
3. Question
A ______________ is an attempt to identify your password by using common words, names of loved ones, pets, birth dates, addresses, and phone numbers.
CorrectIncorrect -
Question 4 of 10
4. Question
______________ is a computer program that enables a person to communicate with a computer through the use of symbols, visual metaphors, and pointing devices.
CorrectIncorrect -
Question 5 of 10
5. Question
As a user, you only see one interface — the movie ticket Web site — but behind the scenes, many applications are working together using APIs. This type of integration is called seamless, since the user never notices when software functions are handed from one application to another.
CorrectIncorrect -
Question 6 of 10
6. Question
____________________ consists of “measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for the restoration of information systems by incorporating protection, detection, and reaction capabilities.”
CorrectIncorrect -
Question 7 of 10
7. Question
Information Risk = Threats * Vulnerabilities / _________________
CorrectIncorrect -
Question 8 of 10
8. Question
Developed at Mitsubishi Electric Corp., a block cipher using a 128-bit key and 64-bit blocks, and a variable number of rounds. Designed for hardware and software implementations, and is resistant to differential and linear cryptanalysis.
CorrectIncorrect -
Question 9 of 10
9. Question
This is typically used to make binary data safe to transport as strictly text.
CorrectIncorrect -
Question 10 of 10
10. Question
The vast majority of compromised servers are broken as a result of this security vulnerability.
CorrectIncorrect