Tuesday, August 30, 2016

Cyber Security: Quiz

how to assess the security risks associated with your digital life based on the likelihood of them occurring and the impact if they do occur. Which of the following risks should be categorised as both high impact and high likelihood?
  • Any successful attack on email, banking details and password information
  • An attack on digital music or videos bought from iTunes or similar
  • An attack that affects someone’s study materials
  • All of these
  • None of these

  Coursera - Hundreds of Specializations and courses in business, computer science, data science, and more 
Question 2
In different approaches to managing risks to your cyber security that you have identified and assessed. What type of risk management is involved in installing a personal firewall?
  • Transferring the risk
  • Avoiding the risk
  • Accepting the risk
  • Reducing the likelihood of the risk
  • Reducing the impact of the risk
Coursera CS
Question 3
The acronym CIA, which stands for Confidentiality, Integrity and Availability. What definition was given for the term integrity?
  • Information is read only by the right people
  • The sender cannot later deny that they sent the information
  • Information is available to read and use whenever we want
  • Information can only be modified by those that are authorised to do this
  • The identity of the sender can be verified

  


Question 4
In the threat ‘landscape’. What definition was given to the term threat?
  • A type of malware
  • A point at which there is the potential for a security breach
  • A danger that can exploit a vulnerability
  • An action you take to protect your information


Question 5
At how and why you need to ensure strong passwords are used and then at some additional security measures to support their use. When you buy something online and the vendor sends you to your bank’s website to enter an additional security number before accepting your credit card number, what technique is being used?
  • Chip and pin
  • Two-factor authentication
  • VPN token
  • Secure Sockets Layer
Coursera Business Vertical

Question 6
At different types of malware. What definition was given of the term virus?
  • Self-replicating code that inserts copies of itself into specific applications and is activated when the program is first run
  • The collective name for software that has been designed to cause damage to data, software or hardware
  • A self-replicating, standalone application which is designed to make copies of itself and infect as many machines as possible across a network
  • An application that appears legitimate, but causes damage behind the scenes

Question 7
At the security of networks. Which of the following is a specific threat to the availability of a wireless network?
  • An eavesdropper picking up the signals and converting these back into the original message
  • A malicious user getting between the sender and the receiver of the messages and making changes to the messages
  • An attacker transmitting lots of random data on the same frequency as the wireless network to cause congestion
  • A man-in-the-middle attack


Coursera Arts & Humanities

Question 8
Look at the following statements about the World Wide Web (WWW), which was discussed in Week 4. Choose the option that identifies the two correct statements.

If you’re on the internet, you’re also on the World Wide Web.
If you’re on the World Wide Web, you’re also on the internet.
Web browsers use the HTTP protocol to request a web page from a web server.
Web browsers use the TCP protocol to request a web page from a web server.

  • 1 and 3 are correct
  • 1 and 4 are correct
  • 2 and 3 are correct
  • 2 and 4 are correct
Coursera - Hundreds of Specializations and courses in business, computer science, data science, and more

Question 9
At cryptography, including the use of encryption. Which relatively recent encryption specification has been widely adopted as the ‘standard’ for symmetric cryptography?
  • DES
  • Triple DES
  • AES
  • Blowfish

Data science is one of today‰Ûªs fastest-growing fields. Become a Data Scientist in 2016 with Coursera.

Question 10
You looked at Virtual Private Networks (VPNs). What type of users are most likely to use a VPN and why?
  • Private users to keep their information private
  • Small organisations that are based in one location to protect their information from outside attack
  • Families that are spread across the globe to keep their emails and Skype calls private
  • Large organisations that have several locations that need to share private information

Question 11
You looked at measures you can take to put things right if a cybersecurity attack on your computer is successful, and at what measures you can take now to reduce the impact of such an attack. What can you do to prevent your data being accessed in the event that your computer is stolen?
  • Implement user accounts with strong passwords
  • Encrypt the hard disk
  • Install a personal firewall
  • Lock your computer
  • Install anti-virus software and keep it up to date

Coursera Data Science


Question 12
You looked at information assets. What is the most important example of an incentive, in the context of information security management?
  • Trust
  • Legislation
  • Regulation
  • Threats

6 comments:

  1. It’s appropriate time to make some plans for the future and it is time to be happy. I have read this post and if I could I wish to suggest you few interesting things or advice. Perhaps you could write next articles referring to this article. I desire to read even more things about it!
    Cyber security training london

    ReplyDelete
  2. Completely agree... Today cyber security is very important and major issue. Thanks for sharing cyber protection information in this blog post...

    ReplyDelete
  3. Cyber Security Cyber security conference is important and essential for the business and for every people, solely, in lightweight of the actual fact that they unite the cluster. Besides, frequently goads following having a crucial exchange with a companion or a tutor, or within the wake of being a bit of a discussion on your most loved purpose within the field of information security.Sharing learning, creating inquiries and meeting exceptional specialists is simply a little of the exercises you'll be able to participate in at such a happening. this is often the rationale we tend to discovered along a summation of most likely the foremost important Cyber security conferences round the globe, therefore you'll be able to utilize it as a manual for find the correct one for you.

    ReplyDelete
  4. With trades, customers can buy or sell Bitcoins with wired exchanges, money or credit/charge card installment. A continuous just as secure exchanging stage is offered by the trades. Excitement and a constant furor consistently goes with Bitcoins. With various fans who are quick to exchange Bitcoins, the youthful money and all the furor encompassing it appears to grow somewhat consistently. bitcoin mixer

    ReplyDelete
  5. Event managers' job roles are becoming increasingly more difficult and demanding, as they have to juggle a multitude of tasks. Blockchain tech events

    ReplyDelete