jueves, 9 de junio de 2016

Cybersecurity v1.1 Module 1 Quiz



Cybersecurity v1.1 Module 1 Quiz

This quiz covers the content of the videos presented in Cybersecurity Module 1. This quiz is designed for practice. You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit scoring is allowed to foster learning. Please note that  on tasks with multiple answers, points can be deducted for selecting incorrect options.
Short answer or essay questions may appear on some of the quizzes. These questions are designed for self-assessment and reflection and are not scored. Sample answers are provided for self-evaluation.
At the completion of the quiz, some items may display feedback. The feedback will reference the source of the content. Example: Refer to curriculum topic: 1.2.0 - indicates that the source of the material for this task is in module 1, presentation 2.


Pregunta 1
True or False?
There is an increasing threat of malware crossing from today's computer networks to physical systems.
true
false

Pregunta 2


What is an important goal of every computer hacker?

to infect as many laptops as possible with malware
to damage the reputation of large organizations

to leave digital graffiti on the websites of major corporations
to leave no trace behind after a system has been hacked

to launch DoS attacks against political websites

Pregunta 3


Fill in the blank.
Refer to the exhibit.
refers to all forms of digital and electronic activities and includes all networks.

Pregunta 4 

What are two common practices that make passwords vulnerable? (Choose two.)
changing passwords very frequently
using passwords that are too short

using SHA-256 to encrypt passwords
using the same password for many different accounts

using a password with a complex mix of characters

Pregunta 5 
 
What type of attack is being attempted if code similar to this is entered in the login field on a web site?
SELECT REPLACE (User_Name, 'administrator', 'hacker') Userlist FROM Credentials;
brute force
DoS

SQL injection
zero day


No hay comentarios:

Publicar un comentario