Which of the following is not true about cybersecurity?(1 point)

Cybersecurity is the protection of computer systems, networks, and data from digital attacks.

Recent data breaches have released personal information of hundreds of millions of people.

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.
Which of the following devices is not connected to the Internet of Things?(1 point)

A smart thermostat that allows you to remotely control your home’s temperature through a mobile app

A digital baby monitor that allows you to stream video and audio of your nursery from the Internet

A wearable device that measures your physical activity and allows you to track your activity through a mobile app

An AM/FM radio without any Bluetooth or Internet connection capabilities
Which of the following is true about the Internet of Things?
I. The Internet of Things is the network of devices with the ability to connect and exchange data.
II. The Internet of Things increases our vulnerability to cyber attacks.
III. The Internet of Things is purely positive–there are no negative consequences to increased connectivity(1 point)

I only

I and II

I and III

None of the above
Online fraud cases in the United States resulted in victim losses totaling:(1 point)

hundreds of thousands of dollars

billions of dollars

millions of dollars

Nothing–online fraud doesn’t result in victim losses
Which of the following is true about jobs in the field of cybersecurity?(1 point)

Right now there aren’t many unfilled cybersecurity positions, but there will be more in the next couple of years.

There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.

There are a lot of unfilled positions in cybersecurity right now, but in the next few years all of those positions will be filled.

There are too many qualified cybersecurity professionals. There are no unfilled positions now, and there won’t be any unfilled positions in the next few years.
Which of the following describes an instance of legal hacking?(1 point)

Grey hat hacking

Security hacking is never legal

Looking for security risks on a product that is excluded from a bug bounty program.

Penetration testing for a company
What is not true of white hat hackers?(1 point)

They contribute to robust security systems

They alert companies of security vulnerabilities

They are breaking the law and are at risk of legal repercussions

They use the same methods as black hat hackers
In cybersecurity, what does CIA stand for?(1 point)

Confidentiality, Integrity, Availability

Cybersecurity, Internet, Accessibility

Cybersecurity Investigation Agency

Central Intelligence Agency
Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99.

Which part of the CIA triad has been broken?

(1 point)

Confidentiality

Integrity

Availability
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.(1 point)

True. This is always the case.

True. Changing your settings does not affect the privacy policy.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

False. Companies do not give you the option to update your settings.

All Answers 1

Answered by GPT-5 mini AI
1) "Cyber attacks can devastate large organizations, but individuals are largely unaffected." (not true)

2) An AM/FM radio without any Bluetooth or Internet connection capabilities

3) I and II

4) Billions of dollars

5) There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.

6) Penetration testing for a company

7) "They are breaking the law and are at risk of legal repercussions." (not true of white hat hackers)

8) Confidentiality, Integrity, Availability

9) Integrity

10) False. It depends if the privacy policy allows you to opt in or out of sharing data.