Cisco !#&? be a network ninja


To the top Chapter 1.6.1 Chapter 1.6.2

Introduction to Cybersecurity

One course of Cisco's "Skills for all"

On completing this course, you will be able to:

Module 1 - Introduction to Cybersecurity

Welcome to this module, which aims to help you understand the growing need for cybersecurity.

Faced with an unprecedented surge in cyber attacks, never before has the demand for cybersecurity professionals been so high.

Find out more about what cybercriminals want and what you can do to ensure that a cyber threat never becomes a reality.

Chapter 1.6 - Quiz

1.6.1 Module 1 quiz

Question

An individual user profile on a social network site is an example of an     ?     identity.

Question

Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm.

What level of cyber protection does each of the following factors require?


a.) Your online identity
b.) A customer database
c.) Economic stabilty

Question

Which of the following pieces of information would be classified as personal data?


Select three correct answers

Question

Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

Question

Which of the following methods can be used to ensure confidentiality of information?


Select three correct answers

Question

What are the foundational principles for protecting information systems as outlined in the McCumber Cube?


Select three correct answers

Question

Why might internal security threats cause greater damage to an organization than external security threats?

Question

Which of the following is a key motivation of a white hat attacker?

Question

Can you identify the cyber attacker type from the following descriptions?


Make political statements in order to raise awareness about issues that are important to them
Gather intelligence or commit sabotage on specific goals on behalf of their government
Use existing tools on the Internet to launch a cyber attack

Question

Which of the following statements describes cyberwarfare?

1.6.2 Module 1 Quiz explanations

1.6.2.1 Ethics Quiz

Question

An employee is laid off after fifteen years with the same company. The employee is then hired by another company within a week. In the new company, the employee shares documents and ideas for products that the employee proposed at the original company.

  1. ethical
  2. unethical
Explanations

Even though the employee was laid off, the employee probably signed a Non-Disclosure Agreement (NDA) with the original company. Any work or idea developed at the original company, regardless of who proposed the idea, is still the property of the original company. Depending on the level of severity of the breach, this could result in legal action.

Answer: unethical

Question

During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year.

  1. ethical
  2. unethical
Explanations

Both the employee and the manager are within the same department and company so this behavior would be ethical.

Answer: ethical

Question

An employee is at a restaurant with friends and describes an exciting new video game that is under development at the company the employee works for. Is the behavior of the employee ethical or unethical?

  1. ethical
  2. unethical
Explanations

It is not ethical to share a confidential product idea before it is released. Describing the game to a group of friends outside the company could leak the idea and jeopardize the new product offering.

Answer: unethical

Question

Alicia, a company employee, has lost her corporate identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to obtain a temporary badge. You lend her your identification badge until she can obtain a replacement.

  1. ethical
  2. unethical
Explanations

Employees should never give their credentials to another employee, regardless of the situation or the familiarity with the other employee. Once your credentials are out of your sight, you have no idea what they are being used for.

Answer: unethical

Question

An employee points out a design flaw in a new product to the department manager.

  1. ethical
  2. unethical
Explanations

Both the employee and the manager are within the same department and company so this behavior would be ethical.

Answer: ethical

1.6.2.2 Quiz to module 1

Question

Which method is used to check the integrity of data?

  1. backup
  2. encryption
  3. authentication
  4. checksum
Explanations

A checksum value of a block of data is calculated and transmitted with the data. After the data is received, the checksum hashing is performed again. The calculated value is compared with the transmitted value to verify the integrity of the data.

Answer: checksum

Question

What is a reason that internal security threats might cause greater damage to an organization than external security threats?

  1. Internal users have direct access to the infrastructure devices.
  2. Internal users have better hacking skills.
  3. Internal users can access the corporate data without authentication.
  4. Internal users can access the infrastructure devices through the Internet.
Explanations

Internal threats have the potential to cause greater damage than external threats because internal users have direct access to the building and its infrastructure devices. Internal users may not have better hacking skills than external attackers. Both internal users and external users can access the network devices through the Internet. A well designed security implementation should require authentication before corporate data is accessed, regardless of whether the access request is from within the corporate campus or from the outside network.

Answer: Internal users have direct access to the infrastructure devices.

Question

What is another name for confidentiality of information?

  1. trustworthiness
  2. privacy
  3. accuracy
  4. consistency
Explanations

Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness describe integrity of data.

Answer: privacy

Question

What is an example of “hacktivism”?

  1. A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.
  2. A country tries to steal defense secrets from another country by infiltrating government networks.
  3. A teenager breaks into the web server of a local newspaper and posts a picture of a favorite cartoon character.
  4. Criminals use the Internet to attempt to steal money from a banking company.
Explanations

Hacktivism is a term used to describe cyberattacks carried out by people who are considered political or ideological extremists. Hacktivists attack people or organizations that they believe are enemies to the hacktivist agenda.ee and the manager are within the same department and company so this behavior would be ethical.

Answer: A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.

Question

What is the motivation of a white hat attacker?

  1. discovering weaknesses of networks and systems to improve the security level of these systems
  2. taking advantage of any vulnerability for illegal personal gain
  3. fine tuning network devices to improve their performance and efficiency
  4. studying operating systems of various platforms to develop a new system
Explanations

White hat attackers break into networks or computer systems in order to discover weaknesses for the purpose of improving the security of these systems. These break-ins are done with permission from the owner or the organization. Any results are reported back to the owner or the organization.oyee and the manager are within the same department and company so this behavior would be ethical.

Answer: discovering weaknesses of networks and systems to improve the security level of these systems

Question

What three items are components of the CIA triad? (Choose three.)

  1. availability
  2. confidentiality
  3. integrity
  4. intervention
  5. access
  6. scalability
Explanations

The CIA triad contains three components: confidentiality, integrity, and availability. It is a guideline for information security for an organization.

Answer: integrity, availability, confidentiality

Question

Which statement describes cyberwarfare?

  1. Cyberwarfare is an attack carried out by a group of script kiddies.
  2. It is a series of personal protective equipment developed for soldiers involved in nuclear war.
  3. It is Internet-based conflict that involves the penetration of information systems of other nations.
  4. It is simulation software for Air Force pilots that allows them to practice under a simulated war scenario.
Explanations

Cyberwarfare is an Internet-based conflict that involves the penetration of the networks and computer systems of other nations. Organized hackers are typically involved in such an attack.

Answer: It is Internet-based conflict that involves the penetration of information systems of other nations.

Question

Match the type of cyber attackers to the description.

Make political statements in order to create an awareness of issues that are important to them.

  1. terrorists
  2. hacktivists
  3. state-sponsored attackers
  4. script kiddies
Answer


hacktivists

Question

Match the type of cyber attackers to the description.

Gather intelligence or commit sabotage on specific goals on behalf of their government.

  1. terrorists
  2. hacktivists
  3. state-sponsored attackers
  4. script kiddies
Answer


state-sponsored attackers

Question

Match the type of cyber attackers to the description.

Make political statements, or create fear, by causing physical or psychological damage to victims.

  1. terrorists
  2. hacktivists
  3. state-sponsored attackers
  4. script kiddies
Answer


terrorists

Question

What are three methods that can be used to ensure confidentiality of information? (Choose three.)

  1. backup
  2. file permission settings
  3. version control
  4. two factor authentication
  5. username ID and password
  6. data encryption
Explanations

Methods including data encryption, username ID and password, and two factor authentication can be used to help ensure confidentiality of information. File permission control, version control, and backup are methods that can be used to help ensure integrity of information.

Answer: data encryption, two factor authentication, username ID and password

Solved quizzes

Skills for all