Computers and Technology

Question 1Cyberspace is wholly contained withinThe internetThe information environmentAll networked computersThe logical networkQuestion 2This is known as an ecosystem of connected sensors attached to everyday devices and appliances:TORIoTAIAoTQuestion 3National cybersecurity is challenging because threatsMostly happen inside national bordersUsually originate from other nationsDo not abide to national bordersAre almost always internationalQuestion 4Governance of the Internet is challenging the sovereign rights of states because international lawRecognizes U.S. laws over other statesRecognizes legal and physical controlIs only relevant in some casesIs irrelevant in cyberspaceQuestion 5Which one of the domestic security services groups below is not continuously being monitored in cyberspace?TerroristsCriminalsAdminsSpiesQuestion 6Which of the following may be considered the most challenging part of cybersecurity?VirusesHumansMalwareHardwareQuestion 7Why is it sometimes difficult to determine if computer problems are due to cyberattack?Computer malfunctions can be the cause of problems.Cyberattacks are never aimed at disrupting hardware.Cyber criminal activities are nearly impossible to detect.Computer problems are never caused by cyberattack.Question 8Which of these is a challenge created by the fast pace of technological changes?Laws and policies have no influence on technological changes.Laws and policies change faster than technology.Laws and policies dont keep the pace of the technological changes.Laws and policies constrict the pace of technological changes.Question 9Which of these is the condition of being free from observation or disruption by other people?PoliticsPoliciesPatiencePrivacyQuestion 10Which is a reason IoT devices are a point of weakness in the cybersecurity landscape?The open source software often used in IoT devices cannot be updated.IoT devices do not require the same kind of security.IoT devices security vulnerabilities are not easily patched.IoT devices cannot use two-factor authentication.