Cybersecurity education/awareness campaign

Generic Clearance for the Collection of Qualitative Feedback on Agency Service Delivery

Questions for cybersecurity quiz

Cybersecurity education/awareness campaign

OMB: 3145-0215

Document [docx]
Download: docx | pdf

Questions for cybersecurity month quiz

  1. What is the most common password?

  1. opensaysme

  2. password

  3. 123456

  4. #dftwt69z3

Correct: c

  1. How can you make your password stronger?

  1. Adding more numbers

  2. Adding more letters that do not make sense

  3. Including the word password

  4. Adding ‘!’ after the password

Correct: b

  1. Which of the following is the safer way to remember your password?

  1. Typing it along with the username in an email or text and sending it to yourself

  2. Using one password for all your accounts

  3. Writing it down and keeping the paper locked away

  4. Using a simple combination such as ‘123456’

Correct: c

  1. Why are modern automobiles’ control systems vulnerable to being hacked?

  1. Because people text and drive

  2. Because many modern cars contain cellular connections

  3. Because many modern cars have Bluetooth wireless technology

  4. Because there are too many cars on the roads

  5. Both b and c

Correct: e [Source: http://www.nsf.gov/about/congress/114/je_cybersecurity_150903.jsp]

  1. What makes biometrics safer than passwords?

  1. Biometrics are based on unique physical characteristics of a person

  2. Biometrics are nearly impossible to fool

  3. Biometrics can’t be stolen

  4. You can’t forget your biometrics

  5. All of the above

Correct: e) http://www.nsf.gov/news/special_reports/science_nation/eyebiometrics.jsp

  1. What is cryptocurrency?

  1. A radioactive mineral

  2. A type of coin used by pharaohs

  3. A new form of digital currency regulated with encryption techniques, independent of a bank

  4. A disorder that makes people prone to stealing

Correct: d) http://nsf.gov/awardsearch/showAward?AWD_ID=1518765&HistoricalAwards=false

  1. What is a computer forensics specialist?

  1. A robot that forays into enemy territory

  2. The main character of a murder mystery

  3. A person who collects and analyses digital evidence related to cybersecurity issues and attacks

  4. A type of doctor

Correct c) http://www.nsf.gov/discoveries/disc_summ.jsp?cntn_id=135868

  1. What is the purpose of open-source software in cybersecurity?

  1. To benefit from the knowledge of the community to find solutions to current security needs

  2. To allow users to change software code to suit their own security needs

  3. To save money and time

  4. All of the above

Correct: d) http://www.livescience.com/14356-cybersecurity-open-source.html

  1. What makes computer hackers “white hat” hackers?

  1. They wear white hats to keep the office environment clean

  2. Their work exposes security vulnerabilities that can be fixed to improve the security of an information system

  3. They break into IT systems, steal information and then leave a white hat at the crime scene

  4. They invented email spamming

Correct b) http://nsf.gov/discoveries/disc_summ.jsp?cntn_id=133185&org=NSF

10. How do you know you are the victim of a zombie cyber-attack?

  1. Zombies are fictional characters and such attacks don’t exist

  2. A walking dead is following you asking for brains

  3. Your computer has been infected with a virus or Trojan allowing it to be under the control of a remote hacker, thus becoming a ‘zombie’

  4. Your computer is now self-aware and is planning to rule the world

Correct c)

File Typeapplication/vnd.openxmlformats-officedocument.wordprocessingml.document
AuthorGiura, Ruxandra
File Modified0000-00-00
File Created2021-01-28

© 2024 OMB.report | Privacy Policy