Chapter 5 - Questions and Answers

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Questions and Answers

1. What is the primary infrastructure of cyberspace?

A) Fiber optics

B) The Internet

C) Satellites

D) Local networks

Answer: B) The Internet

2. What are the three main components that compose cyberspace?

A) Users, points of online interaction, and volume of activity

B) Servers, browsers, and emails

C) Devices, data centers, and applications

D) Social media, search engines, and cloud services

Answer: A) Users, points of online interaction, and volume of activity

3. How is the growth of cyberspace compared in the document?

A) Expansion of an empire

B) Growth of a population in a city

C) Increase in weather patterns

D) Spread of a pandemic

Answer: B) Growth of a population in a city

4. Which website provides real-time statistics on the size of the Internet?

A) Internet Live Stats

B) Web Traffic Monitor

C) Cyber Growth Data

D) Global Net Insights

Answer: A) Internet Live Stats


5. What does the number of email users indicate about cyberspace?

A) The potential for online shopping

B) The size of the active online population base

C) The number of secure websites

D) The total data storage available

Answer: B) The size of the active online population base

6. What is a measure of points of online interaction?

A) Number of social media accounts

B) Number of data centers

C) Number of domains

D) Number of VPNs

Answer: C) Number of domains

7. Which of the following is NOT a measure of the volume of online activity?

A) Volume of total data flows

B) Volume of mobile data flows

C) Number of cybersecurity incidents

D) Annual number of Google searches

Answer: C) Number of cybersecurity incidents

8. How are botnets related to cyber attacks?

A) They are a type of security software

B) They are used for legitimate email marketing

C) They consist of infected computers used for illicit purposes

D) They monitor network traffic for anomalies

Answer: C) They consist of infected computers used for illicit purposes


9. What is a distributed denial of service (DDoS) attack?

A) Blocking a user from accessing their email

B) Overloading a website with requests to make it unavailable

C) Stealing personal data through phishing

D) Installing malware on a device

Answer: B) Overloading a website with requests to make it unavailable

10. What was the Ponemon Institute's annual study focused on?

A) Email usage statistics

B) Cost of data breaches

C) Number of active domains

D) Volume of data flows

Answer: B) Cost of data breaches

11. What is a common characteristic of sophisticated cyber criminals?

A) They primarily target small businesses

B) They are often untrained amateurs

C) They operate from a distance and route communications through other countries

D) They only attack mobile devices

Answer: C) They operate from a distance and route communications through other countries

12. Which value is closely linked to privacy?

A) Independence

B) Economic gain

C) Convenience

D) Efficiency

Answer: A) Independence
13. Which model of data protection is characterized by public enforcement of a comprehensive law?

A) Self-regulation

B) Sector-specific regulation

C) Public enforcement

D) Community policing

Answer: C) Public enforcement

14. Which type of vulnerabilities are specific to mobile devices?

A) Browser vulnerabilities

B) Desktop vulnerabilities

C) Server vulnerabilities

D) Mobile vulnerabilities

Answer: D) Mobile vulnerabilities

15. What is a primary challenge in the connected environment of cyberspace?

A) Limited data storage

B) Difficulty in generating digital data

C) Complexity and the vast amount of data

D) Slow internet speeds

Answer: C) Complexity and the vast amount of data

16. What is one reason why threats are moving to the mobile sphere?

A) Decreasing use of desktop computers

B) Increasing global use of mobile devices

C) Decline in internet usage

D) Improved security on mobile devices

Answer: B) Increasing global use of mobile devices

17. What does "big data" primarily refer to?

A) Small, unstructured datasets

B) Vast stores of information from various sources


C) Limited data from traditional sources

D) Personal data collected from social media only

Answer: B) Vast stores of information from various sources

18. Why is compliance alone not sufficient for cyber security?

A) It is too expensive

B) It provides a false sense of security

C) It is not recognized globally

D) It focuses only on mobile threats

Answer: B) It provides a false sense of security

19. What is an inherent risk of the growing sophistication of cyber threats?

A) Increased regulation by governments

B) Reduced number of cyber attacks

C) Higher value of data to cyber-attackers

D) Less need for cybersecurity measures

Answer: C) Higher value of data to cyber-attackers

20. What is a significant privacy threat posed by governments in cyberspace?

A) Collecting anonymous data for public use

B) Pursuing surveillance and intrusive law enforcement practices

C) Allowing free access to personal data

D) Supporting data encryption for all users

Answer: B) Pursuing surveillance and intrusive law enforcement practices

You might also like