Asked by QuestionHelper123
Which of the following is not true about cybersecurity?(1 point)
Cybersecurity is the protection of computer systems, networks, and data from digital attacks.
As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks.
Recent data breaches have released personal information of hundreds of millions of people.
Cyber attacks can devastate large organizations, but individuals are largely unaffected.
Which of the following is true about jobs in the field of cybersecurity?(1 point)
There are a lot of unfilled positions in cybersecurity right now, but in the next few years all of those positions will be filled.
There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.
Right now there aren’t many unfilled cybersecurity positions, but there will be more in the next couple of years.
There are too many qualified cybersecurity professionals. There are no unfilled positions now, and there won’t be any unfilled positions in the next few years.
In cybersecurity, what does CIA stand for?(1 point)
Cybersecurity Investigation Agency
Confidentiality, Integrity, Availability
Cybersecurity, Internet, Accessibility
Central Intelligence Agency
Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99.
Which part of the CIA triad has been broken?
(1 point)
Confidentiality
Integrity
Availability
Cryptography is defined as:(1 point)
The practice of encoding information so only authorized people can read it
The act of stealing personal information online
Verified authority to view information, such as a password or key
Sensitive information sent over networks that needs to be secured
To decrypt an encrypted message, pass the encrypted message and the _____ to the decrypt function.(1 point)
key
cryptology
ciphertext
decrypted message
Hash functions got the name “hash” because it’s easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.(1 point)
True
False
A primary requirement for a good cryptographic hash function is that the function should not produce too many collisions. A collision in a hash function is when:(1 point)
2 outputs come from the same input.
There are few outputs, but a lot of inputs.
There are few inputs, but a lot of outputs.
2 inputs map to the same output.
Most attacks on hash functions involve:
A. Finding collisions.
B. Pre-generating millions of hashes and comparing them to the plain text that generated it.
C. Really good random guessing.
(2 points)
B and C
A and C
A, B, and C
A and B
Skip to navigation
All Answers 1
Answered by
GPT-5 mini
AI
1) Not true about cybersecurity: "Cyber attacks can devastate large organizations, but individuals are largely unaffected."
2) True about cybersecurity jobs: "There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years."
3) CIA stands for: Confidentiality, Integrity, Availability.
4) Broken part of CIA triad when Alice changes the price: Integrity.
5) Cryptography is defined as: "The practice of encoding information so only authorized people can read it."
6) To decrypt, pass the encrypted message and the: key.
7) Hash statement true/false: True.
8) A collision in a hash function is when: 2 inputs map to the same output.
9) Most attacks on hash functions involve: B and C (pre-generating millions of hashes / comparing them, and random guessing).
2) True about cybersecurity jobs: "There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years."
3) CIA stands for: Confidentiality, Integrity, Availability.
4) Broken part of CIA triad when Alice changes the price: Integrity.
5) Cryptography is defined as: "The practice of encoding information so only authorized people can read it."
6) To decrypt, pass the encrypted message and the: key.
7) Hash statement true/false: True.
8) A collision in a hash function is when: 2 inputs map to the same output.
9) Most attacks on hash functions involve: B and C (pre-generating millions of hashes / comparing them, and random guessing).
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.