Cybersecurity
Protocols + Packets
Internet Basics
Computing
Key Terms
100

Which of the following is true about a keylogger?

A) A keylogger can be a piece of software.
B) A keylogger can be a piece of hardware.
C) Keyloggers can be installed by malware or can have legitimate uses, such as employers wanting to monitor their employees.
D) All of the above.

D) All of the above.

100

Which of the following internet protocols defines how computers send packets of data to each other? Select two answers.

A) HTTP
B) TCP
C) IP
D) UDP

B) TCP

AND

D) UDP

100

On which of the follow areas has the internet had a major effect?

A) Commerce
B) Access to information
C) Education
D) All of the above

All of the above. (Commerce, access to information and education).

100

A type of computation in which many calculations or processes are carried out simultaneously.

What is parallel computing?

100

A way to deliver a faster stream of information by eliminating a lot of the error checking. Often used for connections that need to happen rapidly, such as those used by online games and live videos.

What is UDP?

200

What would pose the greatest security risk when using public key encryption?
A) Exposure of the public key
B) Exposure of the private key
C) Open standards for encrypting data
D) The encrypted message being intercepted by a third party

B) Exposure of the private key

200

Many types of computing devices made by many types of companies can all access the internet. Which of the following makes this access possible?

A) Redundancy
B) Open standards and protocols
C) Fault tolerance
D) Large bandwidth

B) Open standards and protocols

200

The internet is built on open standards. In this context, what does "open" mean?


A) The standards are made freely available and can be used by anyone.
B) The standards cannot be used in proprietary software of any form.
C) The standards can be used in any program that is used exclusively to access the web.
D) The official standards can be made, updated and edited by anyone.

A) The standards are made freely available and can be used by anyone.

200

The improvement in the amount of time a parallelized program takes to solve a problem.

What is speedup?

200

The maximum amount of data that can be transmitted over a network connection in a given amount of time

What is Bandwidth?

300

Which of the following describes the human component of phishing?

A) An unethical programmer develops a webpage to look identical to an e-commerce sit asking for PII data.
B) An unethical programmer develops a program to infect a computer to send emails to every person in the victim's email address list.
C) An unethical programmer decides which site to impersonate based on current events.
D) An unethical programmer sets up a system to collect PII data when an unsuspected victim enters the information in a fraudulent site.

C) An unethical programmer decides which site to impersonate based on current events.

300

Which of the following statements about packets are true? Select two answers.

A) Packets must be received in the order they are sent to be reassembled.
B) Packets do not have to be received in the order they are sent to be reassembled.
C) Packets can travel different paths from the sending computer to the receiving computer.
D) Packets always choose the fastest path available  from sending computer to receiving computer.

B) Packets do not have to be received in the order they are sent to be reassembled.

AND

C) Packets can travel different paths from the sending computer to the receiving computer.

300

Which of the following is NOT a determining factor in which side of the digital divide a citizen is on?
A) Education
B) Socioeconomic status
C) Location
D) Gender

D) Gender

300

To predict the path of a hurricane, a programmer needs to use an extremely large volume of data reported by thousands of sensors. This problem is so large and complex that it is impractical to solve on a single computer, so the programmer decides to use a distributed computing solution. How can a distributed computing solution help speed up the time needed to execute the program?
 
(A) A distributed computing solution can speed up run time by using multiple computers in parallel.
(B) A distributed computing solution can speed up run time by using multiple computers in
soll
(C) A distributed computing solution can speed up run time by using multiple processors in parallel on a single computer.
n can
(D) A distributed computing solution can speed up run time by using multiple processors in
series on a single computer.

(A) A distributed computing solution can speed up run time by using multiple computers in parallel.

300

An interconnected system of web pages and documents accessed through the internet

What is the World Wide Web?

400

Which of the following is an example of cybersecurity being implemented through hardware.

A)To protect against phishing links, an email filter warns users that the email was sent from a suspicious address.
B) To protect against the Meltdown and Spectre vulnerabilities, Intel redesigned their processors to better separate processes and privilege levels.
C) To protect against the Heartbleed vulnerability, the cryptography toolkit OpenSSL was redesigned to ignore data requests that would result in a buffer overflow.
D) To protect against malicious programs, all files downloaded to a computer are scanned for viruses by an antivirus program.

B) To protect against the Meltdown and Spectre vulnerabilities, Intel redesigned their processors to better separate processes and privilege levels.

400

Which of the following best describes the fault-tolerant nature of the Internet?

A) The internet always picks the fastest routes for packets traveling between a sending and receiving computer
B) If a node on the internet fails, the packets choose a different path to the receiving computer.
C) This fault tolerant nature adds an additional layer of privacy for data traveling across the internet.
D) All of the above

B) If a node on the internet fails, the packets choose a different path to the receiving computer.

400

What is the purpose of transitioning from IPv4 to IPv6?

A) IPv4 has been found to be too insecure for modern communication.
B) The rise of internet-connected devices means that the number of available unique IPv4 addresses is sharply decreasing, and IPv6 will allow for more addresses.
C) IPv4 is too slow to be useful in modern communications
D) It is easier to spoof an IPv4 address, as compared to an IPv6 address.

B) The rise of internet-connected devices means that the number of available unique IPv4 addresses is sharply decreasing, and IPv6 will allow for more addresses.

400

When run in series, a program that checks pictures for ears takes 1,000 seconds to check 100 pictures, When running the same program in parallel, the two programs take 10 seconds to check 100 pictures. What is the speedup for the parallel solution?
(A) 1
(B) 10
(C) 100
(D) 1,000

(C) 100

400

How do you calculate speedup?

Speedup is computed as the amount of time to complete the task sequentially divided by the amount of time to complete the task when run in parallel. 

500

How is math utilized in cryptography?

A) The length of a string determines whether it should be encrypted.
B) Individual bits are given new values that are randomly generated using mathematical principles.
C) Bits and group of bits (e.g., characters) are modified by using mathematical and algebraic principles.
D) Math is not used; cryptographic algorithms are purely logic based.

C) Bits and group of bits (e.g., characters) are modified by using mathematical and algebraic principles.

500

Which of the following is true about redundancy on the internet?

I. Redundancy slows down packets traveling from a sending computer to a receiving computer.
II. Redundancy allows for adding new devices to the network without disrupting traffic.
III. Redundancy makes the internet fault tolerant.


II AND III ONLY.

500

How does redundancy improve the scaling of the internet.

A) Redundancy leads to every communication being repeated, which keeps the data from being lost.
B) Redundancy leads to every communication being repeated, which ensures that the connected devices do not disconnect from each other.
C) Redundancy makes connections more reliable, which means that more devices are able to communicate without interruption.
D) Redundancy makes connections more reliable, which means that computers are always on the internet.

C) Redundancy makes connections more reliable, which means that more devices are able to communicate without interruption.

500

When run in series, a program that sorts data takes 40 seconds to sort 300 students based on GPA. When running the same program in parallel, the two programs still take 40 seconds to run. What is the speedup for the parallel solution?
(A) 1
(B) 10
(C) 100
(D) 1,000

(A) 1

500

An attempt by multiple compromised computers or devices to overwhelm a target website or network with excessive traffic, causing it to become slow or unavailable for legitimate users.

 What is a Distributed Denial of Service Attack (DDoS)?

M
e
n
u