Questions for cybersecurity month quiz
What is the most common password?
opensaysme
password
123456
#dftwt69z3
Correct: c
How can you make your password stronger?
Adding more numbers
Adding more letters that do not make sense
Including the word password
Adding ‘!’ after the password
Correct: b
Which of the following is the safer way to remember your password?
Typing it along with the username in an email or text and sending it to yourself
Using one password for all your accounts
Writing it down and keeping the paper locked away
Using a simple combination such as ‘123456’
Correct: c
Why are modern automobiles’ control systems vulnerable to being hacked?
Because people text and drive
Because many modern cars contain cellular connections
Because many modern cars have Bluetooth wireless technology
Because there are too many cars on the roads
Both b and c
Correct: e [Source: http://www.nsf.gov/about/congress/114/je_cybersecurity_150903.jsp]
What makes biometrics safer than passwords?
Biometrics are based on unique physical characteristics of a person
Biometrics are nearly impossible to fool
Biometrics can’t be stolen
You can’t forget your biometrics
All of the above
Correct: e) http://www.nsf.gov/news/special_reports/science_nation/eyebiometrics.jsp
What is cryptocurrency?
A radioactive mineral
A type of coin used by pharaohs
A new form of digital currency regulated with encryption techniques, independent of a bank
A disorder that makes people prone to stealing
Correct: d) http://nsf.gov/awardsearch/showAward?AWD_ID=1518765&HistoricalAwards=false
What is a computer forensics specialist?
A robot that forays into enemy territory
The main character of a murder mystery
A person who collects and analyses digital evidence related to cybersecurity issues and attacks
A type of doctor
Correct c) http://www.nsf.gov/discoveries/disc_summ.jsp?cntn_id=135868
What is the purpose of open-source software in cybersecurity?
To benefit from the knowledge of the community to find solutions to current security needs
To allow users to change software code to suit their own security needs
To save money and time
All of the above
Correct: d) http://www.livescience.com/14356-cybersecurity-open-source.html
What makes computer hackers “white hat” hackers?
They wear white hats to keep the office environment clean
Their work exposes security vulnerabilities that can be fixed to improve the security of an information system
They break into IT systems, steal information and then leave a white hat at the crime scene
They invented email spamming
Correct b) http://nsf.gov/discoveries/disc_summ.jsp?cntn_id=133185&org=NSF
10. How do you know you are the victim of a zombie cyber-attack?
Zombies are fictional characters and such attacks don’t exist
A walking dead is following you asking for brains
Your computer has been infected with a virus or Trojan allowing it to be under the control of a remote hacker, thus becoming a ‘zombie’
Your computer is now self-aware and is planning to rule the world
Correct c)
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
Author | Giura, Ruxandra |
File Modified | 0000-00-00 |
File Created | 2021-01-28 |