Computer Science 110: Introduction to Cybersecurity Final Exam

Free Practice Test Instructions:

Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!

Question 1 1. The very first virus ever created was called what?

Question 2 2. What distinguishes a worm virus from other computer viruses?

Question 3 3. Adding this element to a network can help avoid infection from malicious software such as viruses and Trojan horses.

Question 4 4. What step should you take to fully and completely recover your system from a Trojan horse attack?

Question 5 5. An e-mail client will usually have this type of tool built-in, to help combat phishing attempts.

Question 6 6. Baiting, phishing, pretexting, scareware, and watering holes are all examples of what category of cybercrime?

Question 7 7. This is the modern-day equivalent of junk mail, sending unwanted information to a wide range of individuals.

Question 8 8. This type of cyber attack floods a network with traffic, grinding it to a halt.

Question 9 9. Consider that you manage a small team of professionals who work remotely in the field using cell phones and tablets. You have enacted an acceptable email use policy and a bring your own device policy. Given the above information, which policy is still missing that should be required?

Question 10 10. What is the primary purpose of a certified Information Security Framework (ISF)?

Question 11 11. You have noticed that employees are writing down passwords and attaching them to sticky-notes at their desks. Which of the following should be addressed by leadership?

Question 12 12. At the organizational level, this defines how information security should be established and governed.

Question 13 13. Your organization has installed a tool called CryptoStopper. It places bait on the network and is triggered in what scenario?

Question 14 14. This type of tool is bait for a cybercriminal, where fake sensitive information is left vulnerable in order to try to catch the criminal in the act, while also distracting them from the real data.

Question 15 15. This type of cybercrime detection tool is used to detect critical changes in a system. If a change is made it triggers an alert in the detection system.

Tell us about yourself

Are you a student or a teacher?

I am a student I am a teacher

Computer Science 110: Introduction to Cybersecurity Final Free Practice Test Instructions

Choose your answer to the question and click 'Continue' to see how you did. Then click 'Next Question' to answer the next question. When you have completed the free practice test, click 'View Results' to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support