General
Cyber Threats
Personal Security
Online Protection
Future of Cyber
100

____________ security refers to a collection of technologies, tools, approaches, guidelines, and practices designed to protect networks, devices, and data.

Cyber (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.3)

100

________________ cookies exist for more than one session to provide websites with user preferences or settings on future visits.

Persistent (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.6)

100

Descriptive data that contains information about other data is called?

metadata (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.2)

100

The web browser privacy feature that prevents browsing history from being stored on the users device is called?

Incognito mode (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.7)

100

This is the environment that allows digital technology of many forms to communicate with one another via the Internet

Cyberspace (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.1)

200

This is Software that automatically displays advertising material

Adware (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.5)

200

What does PII stand for?

Personally Identifiable Information (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.6)

200

Your ________________ is created by data flowing between your computer and the internet

Online reputation (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.3)

200

_____________ is the act of using a computer to gain unauthorized access to data in a system.

Hacking (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.1)

200

Developing security strategies to prevent threats normally are handled by: (entry-level, intermediate, advanced or senior-level positions?)

intermediate level positions (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 5.1)

300

Using another's password without permission is a violation of what?

Cyber Ethics (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.4)

300

The practice of manipulating people into revealing confidential or personal information is called?

Social engineering (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.2)

300

A trail of data created by a user through online activity is called?

digital footprint (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.2)

300

_________________ is a type of malicious software that attackers use to block access to a computer system until the user pays a certain amount of money.

Ransomware (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.4)

300

Managing and monitoring security measures are normally handled by what level of position? (entry-level, intermediate, advanced or senior-level positions?) 

Advanced level positions (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 5.2)

400

Which of the following is NOT considered an aspect of cyber security?

A. Endpoint security

B. Business security

C. Information security

D. Network security

Business security (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.2)

400

Which of the following is NOT an example of Malware?

A. Phishing

B. Spyware

C. Ransomware

D. Computer worm

Phishing (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.5)

400

A cyber _______________ is someone who uses the internet to cause psychological, emotional, physical, or emotional harm to a victim.

predator (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.3)

400

A trail of data intentionally left behind by a user who is deliberately sharing information about themselves on websites is called?

active footprint (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.7)

400

A ______________ is a tool that logs and saves every keystroke on a computing device.

keylogger (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 5.2)

500

These are the two different layers of cyberspace

Physical and digital (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.1)

500

Malicious software that looks legitimate but can take control of the computer is called?

Trojan (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 2.3)

500

A trail of data unintentionally left behind by a user without that user's knowledge is called?

passive footprint (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 3.3)

500

_____________ testing is the process of testing a system to identify vulnerabilities through simulated attacks

Penetration (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 4.4)

500

This is a type of a cyber-crime that DOES NOT view a computer as the target

cyberstalking (Reference: Aerospace Dimensions Module 7 (Cyber Security) Objective 1.3)

M
e
n
u