Filters
Question type

Study Flashcards

The Internet provides opportunities for criminals to cause significant damage with minimum resources. For example, in 2017, the WannaCry ransomware attack resulted in several billion dollars of damage. This best represents which vulnerability of the Internet?


A) time and space
B) anonymity/identity
C) asymmetries of cyberspace
D) 1s and 0s

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

C

The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.


A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Discuss the evolution of the Internet and cyberspace. Identify major developments and describe how each contributed to the Internet we have today.

Correct Answer

verifed

verified

A strong answer will include discussion ...

View Answer

______ is a service that can be accessed via the Internet.


A) Cyberspace
B) Internet
C) World Wide Web
D) Computer network

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

______ is a global system of interconnected computer networks that are set up to exchange various types of data.


A) Cyberspace
B) The Internet
C) The World Wide Web
D) A computer network

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

The Internet refers to hardware and software infrastructure that connects computers around the globe, whereas the World Wide Web refers to a service that can be accessed via the Internet.

A) True
B) False

Correct Answer

verifed

verified

The Internet refers to the virtual environment in which people communicate and interact with others.

A) True
B) False

Correct Answer

verifed

verified

The information layer of cyberspace is where the platform nature of the Internet is defined and created.

A) True
B) False

Correct Answer

verifed

verified

______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.


A) Security vulnerability
B) Cyber security
C) Computer virus
D) Cyber attack

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Identify and describe the three aspects around the development of the Internet. Discuss the significance of each aspect including how each shaped the way we use the Internet today.

Correct Answer

verifed

verified

An answer will identify and describe:
(1...

View Answer

All of the following are layers of cyberspace except ______.


A) physical layer
B) social layer
C) information layer
D) logic layer

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following can be described as unidirectional, or that a user can link from their content to another website's content without asking for approval from the owner of the destination page?


A) hyperlink
B) email address
C) URL
D) Internet

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The physical layer of the cyberspace consists of physical devices such as PCs, networks, wires, grids, and routers.

A) True
B) False

Correct Answer

verifed

verified

Which layer of cyberspace includes the creation and distribution of information and interaction between users?


A) physical layer
B) social layer
C) information layer
D) logic layer

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet?


A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

B

Define and differentiate cyberspace, the Internet, and the World Wide Web. In your discussion, explain the relationship and/or interdependency of each on the others.

Correct Answer

verifed

verified

A good answer will define each of the fo...

View Answer

Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability?


A) time and space
B) anonymity/identity
C) lack of barriers to entry
D) asymmetries of cyberspace

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The ______ layer of cyberspace is best described as where the platform nature of the Internet is defined and created.


A) physical
B) social
C) information
D) logic

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

D

______ is an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.


A) Cyberspace
B) Internet
C) World Wide Web
D) Computer network

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following best represents the contribution of IPS to the modern Internet?


A) smaller computers with greater capabilities
B) connected computers across university campuses
C) the first e-mail utility program
D) enabling data to be stored and moved as packets

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 40

Related Exams

Show Answer