• 5. Why might internal security threats cause greater damage to an organization than external security threats
  • 6. Which of the following is a key motivation of a white hat attacker
  • Discovering weaknesses of networks and systems to improve the security level of these systems
  • 1. Which of the following methods is used to check the integrity of data?




    Download 16.87 Kb.
    bet2/3
    Sana22.08.2023
    Hajmi16.87 Kb.
    #79213
    1   2   3
    Bog'liq
    Introduction to Cybersecurity Module 1
    INFORMATIKA JAMLANMA 2022 tushganlar, Etiket kásip ruwxıylıǵınıń sırtqı mazmunı sıpatında., mahmudova-gulruh-zokir-qizi-mustaqil-ish, @IELTSmaterials N1 IELTS Reading (3), 2-O`quv topshiriq (1), sarvar 61, iclud, ILIM ZIYO matematiha , 11, Amonova Mahliyo Safarovna, 2-sinf Ona tili Shaxs va narsaning nomini bildirgan so’zlar dars ishlanma, 9-май Гулнора Азимова, BOSHLAN INTERFAOL METOD, Mantiqiy fiklash
    Social security number

  • Driver license number

  • Date and place of birth

  • Job title

  • IP address

    Explanation: Personal data describes any information about you, including your name, social security number, driver license number, date and place of birth, your mother’s maiden name, and even pictures or messages that you exchange with family and friends.
    5. Why might internal security threats cause greater damage to an organization than external security threats?

    6. Which of the following is a key motivation of a white hat attacker?

    • Taking advantage of any vulnerability for illegal personal gain

    • Fine tuning network devices to improve their performance and efficiency

    • Studying operating systems of various platforms to develop a new system

    • Discovering weaknesses of networks and systems to improve the security level of these systems

    7. An individual user profile on a social network site is an example of an ______ identity.

    • Online

    • Offline

    8. Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. What level of cyber protection does each of the following factors require?

    • Your online identity – Personal

    • A customer database – Organizational

    • Economic stabilty – Government


    Download 16.87 Kb.
  • 1   2   3




    Download 16.87 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    1. Which of the following methods is used to check the integrity of data?

    Download 16.87 Kb.