Cyberspace Principles Course
  • Introduction
  • Table of Contents
    • Introduction
    • Cybersecurity Concepts
      • Quiz
    • Principles of Cryptography
      • Quiz
    • Threats in Cyberspace
      • Quiz
    • Crime and Abuse in Cyberspace
      • Quiz
    • Conduct and Ethics in a Digital World
      • Quiz
    • Code of Ethics
Powered by GitBook
On this page
  1. Table of Contents
  2. Threats in Cyberspace

Quiz

A "weak" password is:

  1. A highly complex password

  2. A password with little to no complexity

  3. A password that is easily memorable

  4. A password that is not easily remembered

What does "CERT" stand for?

  1. Cadet Emergency Response Team

  2. Cyber Emergency Response Team

  3. Computer Emergency Response Team

  4. Computer Education and Remediation Team

What is the cyclical process to strengthen an organization's security posture?

  1. Detect, Prevent, Respond

  2. Harden, Find, Kick out

  3. Prevent, Detect, Respond

  4. Observe, Orient, Decide, Act

What is the type of malware that monitors key strokes or mouse clicks from a user?

  1. Rootkit

  2. Worms

  3. Viruses

  4. Keyloggers

  5. Backdoors

True or False: Information Technology professionals are typically concerned with all aspects of the CIA Triad?

PreviousThreats in CyberspaceNextCrime and Abuse in Cyberspace

Last updated 7 years ago