Filters
Question type

Study Flashcards

______ is a service that can be accessed via the Internet.


A) Cyberspace
B) Internet
C) World Wide Web
D) Computer network

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Criminal knowledge that their efforts will likely lead to success because there are so many potential victims and so few barriers or oversight online best describes which Internet gateway to vulnerability?


A) time and space
B) anonymity/identity
C) lack of barriers to entry
D) asymmetries of cyberspace

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Whereas in the past criminals had to physically approach their victims to carry out a crime, the Internet allows offenders to be in other states, or even continents, and still carry out the same crime. This best represents which of the following vulnerabilities of the Internet?


A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

B

All of the following are layers of cyberspace except ______.


A) physical layer
B) social layer
C) information layer
D) logic layer

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

The ______ of the Internet might be a concern for parents regarding who their children may be talking to online.


A) anonymity/identity
B) time and space
C) asymmetries of cyberspace
D) lack of barriers to entry

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

The Internet refers to the virtual environment in which people communicate and interact with others.

A) True
B) False

Correct Answer

verifed

verified

The Internet provides opportunities for criminals to cause significant damage with minimum resources. For example, in 2017, the WannaCry ransomware attack resulted in several billion dollars of damage. This best represents which vulnerability of the Internet?


A) time and space
B) anonymity/identity
C) asymmetries of cyberspace
D) 1s and 0s

E) None of the above
F) All of the above

Correct Answer

verifed

verified

C

The physical layer of the cyberspace consists of physical devices such as PCs, networks, wires, grids, and routers.

A) True
B) False

Correct Answer

verifed

verified

The information layer of cyberspace is where the platform nature of the Internet is defined and created.

A) True
B) False

Correct Answer

verifed

verified

The ______ layer of cyberspace is best described as where the platform nature of the Internet is defined and created.


A) physical
B) social
C) information
D) logic

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

D

Discuss the evolution of the Internet and cyberspace. Identify major developments and describe how each contributed to the Internet we have today.

Correct Answer

verifed

verified

A strong answer will include discussion ...

View Answer

Which of the following can be described as unidirectional, or that a user can link from their content to another website's content without asking for approval from the owner of the destination page?


A) hyperlink
B) email address
C) URL
D) Internet

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Define and differentiate cyberspace, the Internet, and the World Wide Web. In your discussion, explain the relationship and/or interdependency of each on the others.

Correct Answer

verifed

verified

A good answer will define each of the fo...

View Answer

Identify and describe the three aspects around the development of the Internet. Discuss the significance of each aspect including how each shaped the way we use the Internet today.

Correct Answer

verifed

verified

An answer will identify and describe:
(1...

View Answer

Which layer of cyberspace includes the creation and distribution of information and interaction between users?


A) physical layer
B) social layer
C) information layer
D) logic layer

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

______ is an interdependent network of information technology infrastructures including the Internet, telecommunications networks, and computer systems.


A) Cyberspace
B) Internet
C) World Wide Web
D) Computer network

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.


A) Security vulnerability
B) Cyber security
C) Computer virus
D) Cyber attack

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

______ is a global system of interconnected computer networks that are set up to exchange various types of data.


A) Cyberspace
B) The Internet
C) The World Wide Web
D) A computer network

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

The Internet refers to hardware and software infrastructure that connects computers around the globe, whereas the World Wide Web refers to a service that can be accessed via the Internet.

A) True
B) False

Correct Answer

verifed

verified

Which of the following best represents the contribution of IPS to the modern Internet?


A) smaller computers with greater capabilities
B) connected computers across university campuses
C) the first e-mail utility program
D) enabling data to be stored and moved as packets

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 40

Related Exams

Show Answer