jueves, 9 de junio de 2016

Cybersecurity v1.1 Module 5 Quiz



Cybersecurity v1.1 Module 5 Quiz

This quiz covers the content of the videos presented in Cybersecurity Module 5. This quiz is designed for practice. You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit scoring is allowed to foster learning. Please note that  on tasks with multiple answers, points can be deducted for selecting incorrect options.
Short answer or essay questions may appear on some of the quizzes. These questions are designed for self-assessment and reflection and are not scored. Sample answers are provided for self-evaluation.
At the completion of the quiz, some items may display feedback. The feedback will reference the source of the content. Example: Refer to curriculum topic: 1.2.0 - indicates that the source of the material for this task is in module 1, presentation 2.

Pregunta  1
During a cyberwarfare attack, which group is responsible for disabling the firewalls and IDS systems of the target?
offensive operations teams
internal users

backdoor team
defense suppression team


Pregunta 2  

What are two key considerations in designing a cybersurveillance program? (Choose two.)
that it be controllable remotely
that it have ability to communicate with different languages

that it be untraceable
that it have ability to launch a DDoS attack

that it be fault tolerant


Pregunta 3

What are the features of social network websites that make them a security threat to users?
The sites inspect email, making it impossible to maintain privacy.
The sites are too user friendly, making it too simple to create fake accounts.

The sites use chat services that could be exploited to gain network access.
The sites make it easy to distribute malware and give the distributor statistics of the hits to expect.


Pregunta 4   

Refer to the exhibit. In which section of the Cisco Security Intelligence Operations (SIO) is all of the threat information gathered?
SensorBase
Dynamic Updates

Threat Operations Center


Pregunta 5
Which security threat method would be used to target a specific demographic such as government workers for a particular country?
cloud computing
cyberwar

search engine optimization (SEO) poisoning
money mules


Pregunta 6  
True or False?
Cyberwarfare can be launched by a small group of highly skilled attackers.
false
true

No hay comentarios:

Publicar un comentario