QuestionBankChapter6 Cybersecurity Important
QuestionBankChapter6 Cybersecurity Important
QuestionBankChapter6 Cybersecurity Important
Questions on Chapter 6
Complete all the review questions listed here to test your understanding of the topics and concepts
in this chapter.
1. Match each item of column one to column two
a. Organizations need to have certain framework,
1- People
in place to tackle cyberattacks
b. used to protect these entities include firewalls,
2- Processes DNS filters, anti-malware solutions, antivirus
solutions, and email security solutions
c. should understand and comply with the basic
3- Technology
principles of data security
Page 1 of 4
Dr Samia Habib Talmoudi Applied College of Tabuk 1443-1444
10. Firewall.
Page 2 of 4
Dr Samia Habib Talmoudi Applied College of Tabuk 1443-1444
a. is the technology used to create rules for a system, so incoming and outgoing traffic can be
filtered.
b. is the moment when an attacker takes advantage of a system's vulnerability and gains access
c. is a broad term or an umbrella that includes any malicious software that can harm a
computer.
d. is defined as malware that can harm certain programs on a computer.
11. Malware.
a. is the technology used to create rules for a system, so incoming and outgoing traffic can be
filtered.
b. is the moment when an attacker takes advantage of a system's vulnerability and gains
access
c. is a broad term or an umbrella that includes any malicious software that can harm a
computer.
d. can harm certain programs on a computer.
12. Virus.
a. is the technology used to create rules for a system, so incoming and outgoing traffic can be
filtered.
b. is the moment when an attacker takes advantage of a system's vulnerability and gains access
c. is a broad term or an umbrella that includes any malicious software that can harm a
computer.
d. can harm certain programs on a computer.
13. Ransomware:
a. encrypt all the data on your computer and prevent you from accessing it.
b. is usually masked and lies under a file, which may be important to a user.
c. can do something annoying like consuming the network bandwidth.
d. can flood a network with malicious traffic so that genuine requests for a website cannot be
accommodated in the bandwidth.
14. Trojan Horse:
a. encrypt all the data on your computer and prevent you from accessing it.
b. is usually masked and lies under a file, which may be important to a user.
c. can do something annoying like consuming the network bandwidth.
d. can flood a network with malicious traffic so that genuine requests for a website cannot be
accommodated in the bandwidth.
15. Worm:
a. encrypt all the data on your computer and prevent you from accessing it.
b. is usually masked and lies under a file, which may be important to a user.
c. can do something annoying like consuming the network bandwidth.
d. can flood a network with malicious traffic so that genuine requests for a website cannot be
accommodated in the bandwidth.
16. DDoS:
a. encrypt all the data on your computer and prevent you from accessing it.
b. is usually masked and lies under a file, which may be important to a user.
c. can do something annoying like consuming the network bandwidth.
Page 3 of 4
Dr Samia Habib Talmoudi Applied College of Tabuk 1443-1444
d. can flood a network with malicious traffic so that genuine requests for a website cannot be
accommodated in the bandwidth.
Page 4 of 4