100% found this document useful (1 vote)
24 views2 pages

Activity in Cyberspace

Making the Activity in Living in the IT Era Subject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
24 views2 pages

Activity in Cyberspace

Making the Activity in Living in the IT Era Subject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Activity in Cyberspace

1. It is one in which a user can make user can make use of the internet with an
unreasonable fear of suffering a high cost.
A. Cyber Crime
B. Cyber Bullying
C. Cyber Sex
D. Cyberspace
2. Which is not true about Cyberspace?
A. It can be defined in some of combination of reputational, monetary and rights
violations terms.
B. It is an incident wherein information is stolen or taken from a system without the
knowledge or authorization of the system’s owner.
C. It is one in which a user can make use of the Internet without an unreasonable
fear of suffering a high cost.
D. None of the Above

3. What is the true definition Cybercriminal?


A. Those are the hackers of your computers
B. These are the people who likes to send nudes and viral scandals that they can
see your Juicy Pussies, and Huge Dickies
C. These are the people in Call Center Agents
D. These who are gain access to a zero-day vulnerability can attack computers
easily, as there is no defense against this exploitation, Therefore they are a
Highly potent vector of attack.

4. What are three factors to describe the security of cyberspace in order?


A. The vectors available for cyber attack; The occurrence of cyber attacks; and The
damage caused by successful cyber attacks.
B. The Occurrence of cyber attacks; The Vectors available for cyber attack; and The
damage caused by successful cyber attacks.
C. The damage caused by successful cyber attacks; The Occurrence of cyber
attacks; and The vectors available for cyber attack.
D. None of them above.

5. What are the concepts of the number of attacks is operationalized?


A. Botnets; and Recorded web-based attacks
B. Post-breach reaction costs
C. Lost Business costs
D. Watching Viral Scandals on illegal websites
6. What is Data Breach?
A. It is an individual who commits cybercrimes, where he/she makes use of the
computer either as a tool or as a target or as both.
B. It is an incident wherein information is stole or taken from a system without the
knowledge or authorization of the system’s owner.
C. These are passive vector of attack for cybercriminals because they require that
the user go to an infected domain.
D. Ask your classmates what is their answers, and copy the wrong answers.

7 – 10 Give me some the concept of the vectors of cyber attack via the following
measures:

11 – 16 Give me some concept of the damage of attacks:

17 – 20 In your own opinion what is Cyberspace?

You might also like