____________ security refers to a collection of technologies, tools, approaches, guidelines, and practices designed to protect networks, devices, and data.
Cyber (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.3)
________________ cookies exist for more than one session to provide websites with user preferences or settings on future visits.
Persistent (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.6)
Descriptive data that contains information about other data is called?
metadata (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.2)
The web browser privacy feature that prevents browsing history from being stored on the users device is called?
Incognito mode (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.7)
This is the environment that allows digital technology of many forms to communicate with one another via the Internet
Cyberspace (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.1)
This is Software that automatically displays advertising material
Adware (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.5)
What does PII stand for?
Personally Identifiable Information (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.6)
Your ________________ is created by data flowing between your computer and the internet
Online reputation (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.3)
_____________ is the act of using a computer to gain unauthorized access to data in a system.
Hacking (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.1)
Developing security strategies to prevent threats normally are handled by: (entry-level, intermediate, advanced or senior-level positions?)
intermediate level positions (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 5.1)
Using another's password without permission is a violation of what?
Cyber Ethics (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.4)
The practice of manipulating people into revealing confidential or personal information is called?
Social engineering (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.2)
A trail of data created by a user through online activity is called?
digital footprint (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.2)
_________________ is a type of malicious software that attackers use to block access to a computer system until the user pays a certain amount of money.
Ransomware (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.4)
Managing and monitoring security measures are normally handled by what level of position? (entry-level, intermediate, advanced or senior-level positions?)
Advanced level positions (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 5.2)
Which of the following is NOT considered an aspect of cyber security?
A. Endpoint security
B. Business security
C. Information security
D. Network security
Business security (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.2)
Which of the following is NOT an example of Malware?
A. Phishing
B. Spyware
C. Ransomware
D. Computer worm
Phishing (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.5)
A cyber _______________ is someone who uses the internet to cause psychological, emotional, physical, or emotional harm to a victim.
predator (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.3)
A trail of data intentionally left behind by a user who is deliberately sharing information about themselves on websites is called?
active footprint (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.7)
A ______________ is a tool that logs and saves every keystroke on a computing device.
keylogger (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 5.2)
These are the two different layers of cyberspace
Physical and digital (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.1)
Malicious software that looks legitimate but can take control of the computer is called?
Trojan (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.3)
A trail of data unintentionally left behind by a user without that user's knowledge is called?
passive footprint (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.3)
_____________ testing is the process of testing a system to identify vulnerabilities through simulated attacks
Penetration (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 4.4)
This is a type of a cyber-crime that DOES NOT view a computer as the target
cyberstalking (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.3)