QuestionBankChapter6 Cybersecurity Important

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Dr Samia Habib Talmoudi Applied College of Tabuk 1443-1444

Questions on Chapter 6

Course: Networks and Internet


Chapter 6: Cybersecurity and why it’s important
Dr Samia Habib Talmoudi
Applied College of Tabuk 2022-2023

Complete all the review questions listed here to test your understanding of the topics and concepts
in this chapter.
1. Match each item of column one to column two
a. Organizations need to have certain framework,
1- People
in place to tackle cyberattacks
b. used to protect these entities include firewalls,
2- Processes DNS filters, anti-malware solutions, antivirus
solutions, and email security solutions
c. should understand and comply with the basic
3- Technology
principles of data security

2. Match each item of column one to column two

1- Virtual Private Network a. is a parent for child devices that are


interconnected, such as computers, smartphones,
(VPN)
printers

2- IP b. is a technology that allows a user to access their


files from anywhere in the world.

3- Cloud computing c. is used by other devices to locate and


communicate with each other.

4- Domain d. encrypt the traffic for you so that the government


cannot track your activities online

Page 1 of 4
Dr Samia Habib Talmoudi Applied College of Tabuk 1443-1444

Check the correct answer.


3. Cybersecurity comprises a set of relevant tools and approaches toward risk management and
technologies:
a. to protect the devices, programs, networks and information against attacks and
unauthorized access.
b. to protect the devices, programs, networks and information against attacks and authorized
access.
c. to protect the devices, against viruses
d. to protect the programs and information against malware.
4. cybersecurity is vital because:
a. There are antiviruses installed on the server
b. There are no firewalls equipment installed on the LAN
c. The organization has updated his technology
d. There are loopholes and vulnerabilities which can be exploited by an attacker
5. Which from the following is not responsible of cyberattack:
a. A breach in the system
b. Theft of software source code
c. Updating software
d. The leak of customer data
6. Identity
a. Is an aspect through which users can interact.
b. – is data related to the user, business, system, or customer.
c. Is the part where everyone is connected and restricted via access levels.
d. None
7. Network
a. Is an aspect through which users can interact.
b. – is data related to the user, business, system, or customer.
c. Is the part where everyone is connected and restricted via access levels.
d. None
8. Most organizations are rapidly moving all their data to the cloud because
a. cloud-based servers offer better computing power
b. cloud-based servers offer better security
c. cloud-based servers offer better security and less cost of storing data
d. organization have to maintain cloud infrastructure.
9. Breach.
a. is the technology used to create rules for a system, so incoming and outgoing traffic can be
filtered, is known as a firewall.
b. is the moment when an attacker takes advantage of a system's vulnerability and gains access
c. is a broad term or an umbrella that includes any malicious software that can harm a
computer.
d. is defined as malware that can harm (‫ )يمكن أن تضر‬certain programs on a computer.

10. Firewall.
Page 2 of 4
Dr Samia Habib Talmoudi Applied College of Tabuk 1443-1444

a. is the technology used to create rules for a system, so incoming and outgoing traffic can be
filtered.
b. is the moment when an attacker takes advantage of a system's vulnerability and gains access
c. is a broad term or an umbrella that includes any malicious software that can harm a
computer.
d. is defined as malware that can harm certain programs on a computer.
11. Malware.
a. is the technology used to create rules for a system, so incoming and outgoing traffic can be
filtered.
b. is the moment when an attacker takes advantage of a system's vulnerability and gains
access
c. is a broad term or an umbrella that includes any malicious software that can harm a
computer.
d. can harm certain programs on a computer.
12. Virus.
a. is the technology used to create rules for a system, so incoming and outgoing traffic can be
filtered.
b. is the moment when an attacker takes advantage of a system's vulnerability and gains access
c. is a broad term or an umbrella that includes any malicious software that can harm a
computer.
d. can harm certain programs on a computer.
13. Ransomware:
a. encrypt all the data on your computer and prevent you from accessing it.
b. is usually masked and lies under a file, which may be important to a user.
c. can do something annoying like consuming the network bandwidth.
d. can flood a network with malicious traffic so that genuine requests for a website cannot be
accommodated in the bandwidth.
14. Trojan Horse:
a. encrypt all the data on your computer and prevent you from accessing it.
b. is usually masked and lies under a file, which may be important to a user.
c. can do something annoying like consuming the network bandwidth.
d. can flood a network with malicious traffic so that genuine requests for a website cannot be
accommodated in the bandwidth.
15. Worm:
a. encrypt all the data on your computer and prevent you from accessing it.
b. is usually masked and lies under a file, which may be important to a user.
c. can do something annoying like consuming the network bandwidth.
d. can flood a network with malicious traffic so that genuine requests for a website cannot be
accommodated in the bandwidth.
16. DDoS:
a. encrypt all the data on your computer and prevent you from accessing it.
b. is usually masked and lies under a file, which may be important to a user.
c. can do something annoying like consuming the network bandwidth.

Page 3 of 4
Dr Samia Habib Talmoudi Applied College of Tabuk 1443-1444

d. can flood a network with malicious traffic so that genuine requests for a website cannot be
accommodated in the bandwidth.

17. Cybersecurity is defined as the process of ensuring ICA of information:


a. YES
b. NO
18. A framework help organization to identify the attacker and protect all systems:
a. YES
b. NO
19. Without technology, organizations would have the necessary tools for computer security to
protect themselves against cyberattacks
a. YES
b. NO
20. Data breach can cause revenue win due to data protection practices being non-compliant.
a. YES
b. NO
21. an organization with all the latest IT equipment to cater to all their digital needs for their
business works smoothly.
a. YES
b. NO
22. The connectivity is an advantage today but can be harmful to the organization.
a. YES
b. NO
23. data-whether it is in rest or motion-also needs to be secured.
a. YES
b. NO
24. Encryption is the process of encoding data using a known algorithm so that no one can access
it, except someone with a decoding key.
a. YES
b. NO
25. Click jacking is an attack that reviews the security of an organization's infrastructure.
a. YES
b. NO

Page 4 of 4

You might also like