CYB 100 CYB100 cyb 100 Best Tutorials Guide — onlinehelp123.com

Donny Job
9 min readAug 17, 2021

http://www.onlinehelp123.com/CYB-100

CYB/100

Cyber Domain

The Latest Version A+ Study Guide

**********************************************

CYB 100 Entire Course Link

http://www.onlinehelp123.com/CYB-100

**********************************************

CYB 100 Wk 1 — Practice: Knowledge Check

1. Question 1

/ 4

The Open Systems Interconnection (OSI) model has how many layers?

1.

7

2.

3

3.

5

4.

2

2. Question 2

Which protocol is used to allow users to access the Internet?

1.

Hypertext Transfer Protocol or HTTP

2.

File Transfer Protocol or FTP

3.

Peer to peer networking or P2P

4.

Transmission control protocol/Internet protocol or TCP/IP

3. Question 3

/ 4

Which of these components is NOT part of the physical-network layer of cyberspace?

1.

Policies

2.

Modems

3.

Cables

4.

Routers

4. Question 4

/ 4

The cyber-persona layer of cyberspace includes which of the following components?

1.

Digital identity

2.

Geographical

3.

Software

4.

Internet protocols

5. Question 5

/ 4

Cybersecurity threats are a problem that is

1.

Growing

2.

Shrinking

3.

Staying the same

4.

Not really a problem

6. Question 6

The logical network layer of cyberspace includes which of the following components?

1.

Firmware

2.

People

3.

Computers

4.

Digital identity

7. Question 7

/ 4

Visiting a website includes these two layers of the OSI model working together:

1.

Physical and data link

2.

Transport and session

3.

Physical and presentation

4.

The logical and cyber persona

8. Question 8

/ 4

Why is anonymization a challenge of cybersecurity?

1.

It protects users’ identity and obscures criminals’ identity.

2.

Users and criminals should never be anonymous.

3.

Criminals identity is anonymous, but users are not.

4.

Governments do not want anonymization.

9. Question 9

/ 4

Select layers of cyberspace according to the U.S. Department of Defense.

1.

Physical-network, logical, and cyber-persona

2.

Data, devices, and people

3.

Hardware, software, and information

4.

Physical, transport, and application

10. Question 10

/ 4

Most of the support behind the development of early computer networks came from the U.S. DoD and which of the following?

1.

Advanced Research Projects Agency (ARPA)

2.

National Security Agency (NSA)

3.

Department of Health and Human Services (HHS)

4.

Department of Justice (DoJ)

CYB 100 Wk 1 — Apply: Signature Assignment: Cyberspace Presentation

Create a 6- to 8-slide presentation with speaker notes and visuals.

Identify the Department of Defense’s (DoD) model of cyberspace.

Define each layer and provide a brief description of each.

Compare the DoD model with the OSI model.

Discuss the similarities and differences such as how the layers overlap, etc.

Format any references according to APA guidelines.

Submit your assignment.

CYB 100 Wk 2 — Practice: Knowledge Check

1. Question 1

The World Wide Web Consortium (W3C) manages the development of the protocols associated with the World Wide Web, usually accessed via

1.

A home network

2.

A computer browser

3.

The Internet

4.

A mobile network

2. Question 2

/ 4

During early development of the Internet, governance discussions focused on interoperability and which of the following?

1.

Politics

2.

Efficiency

3.

Security

4.

Protocols

3. Question 3

/ 4

Does the U.S. consider cyberspace similarly to land, sea, air, and space?

1.

Yes, it must be defended like other terrains.

2.

No, it has no borders and is not like other terrains.

3.

Yes, but it cannot be defended by anyone.

4.

No, it is global and a completely free space.

4. Question 4

/ 4

Geography is a challenge of cyberspace, because there is

1.

No border in cyberspace

2.

No geography of cyberspace

3.

No government control in cyberspace

4.

No stateless maneuver space

5. Question 5

/ 4

ISPs use this device to manage data to the user location:

1.

WiFi

2.

Router

3.

Switch

4.

Modem

6. Question 6

/ 4

The average speed of a router is?

1.

800 Gb

2.

400 Gb

3.

500 Gb

4.

100 Gb

7. Question 7

/ 4

The TCP/IP Stack Host-to-Host layer parallels the functions of which layer of OSI?

1.

Presentation

2.

Network

3.

Transport

4.

Session

8. Question 8

/ 4

How many layers does the TCP/IP Stack have?

1.

7

2.

5

3.

4

4.

10

9. Question 9

/ 4

Which of the following common household items might now be included in the physical layer?

1.

A smart thermostat

2.

A garage door opener

3.

A vacuum cleaner

4.

A standard doorbell

10. Question 10

/ 4

This device connects nodes within the network and hubs:

1.

Computer

2.

Router

3.

Repeater

4.

Switch

CYB 100 Wk 2 — Apply: Connecting to the Physical-Network Layer Assignment

Write a 1- to 2-page paper or create a 6- to 8-slide presentation with visuals and speaker notes about how you are connected to the physical-network layer of the cyber domain.

Identify the devices in your home that are connected to a network, such as your phone, computers, or other networked devices.

Explain how those devices are connected to a larger network, such as a cellular provider or ISP.

Discuss at least 3 threats to you and your connected networks.

Format any references according to APA guidelines.

Submit your assignment.

CYB 100 Wk 3 — Practice: Knowledge Check

1. Question 1

/ 4

Ransomware is a class of

1.

Malware

Correct answer

2.

Trojan

3.

Hacking

4.

Spoofing

2. Question 2

/ 4

A file virus does not attack the following file types:

1.

.doc

Correct answer

2.

.exe

3.

.com

4.

.dll

3. Question 3

/ 4

A denial-of-service (DoS) attack using multiple machines to carry out the attack is called

1.

Distributed denial-of-service (DDoS)

Correct answer

2.

A sweeper

3.

Ransomware

4.

A smurf attack

4. Question 4

/ 4

Trojan horse programs, memory-scrapers, and spyware are examples of

1.

Malware

Correct answer

2.

Ransomware

3.

Adware

4.

Computer worms

5. Question 5

/ 4

Packet switching describes the method of how which of the following transits networks?

1.

Images

2.

Information

Correct answer

3.

User identification

4.

Passwords

6. Question 6

/ 4

A brute force attack is a form of one of the following:

1.

Denial of Service Attack

2.

Password Cracking

Correct answer

3.

Log Management

4.

System Monitoring

7. Question 7

/ 4

The logical network layer of cyberspace includes which of the following components?

1. Incorrect:

Computers

2.

Firmware

Correct answer

3.

People

4.

Digital identity

8. Question 8

/ 4

If a new virus is created that has not yet been identified, it is called which of the following?

1.

Zombie

2.

Unidentified Virus

3.

Brute-Force

4.

Zero-Day

Correct answer

9. Question 9

/ 4

This term describes any software that harms a computer and deletes data:

1.

Social Engineering

2.

Malware

Correct answer

3.

TCP

4.

Botnet

10. Question 10

/ 4

A virus is an example of which type of cyber threat?

1.

Network security

2.

Physical security

3.

Logical security

Correct answer

4.

Personal security

CYB 100 Wk 3 — Apply: OSI Characteristics Paper

Write a 2- to 3-page paper.

Identify the 7 layers of the OSI model.

Describe 2 to 3 characteristics, protocols, or functions of each layer (i.e. what happens in each layer or what it does) in 1 to 2 paragraphs each.

Cite at least 2 sources, such as video, library articles, or websites other than your textbook in your assignment.

Format your references according to APA guidelines.

Submit your assignment.

CYB 100 Wk 4 — Practice: Knowledge Check

1. Question 1

/ 4

Which of the following explains the relationship between persons and cyber personas?

1.

Each person can have many cyber personas

Correct answer

2.

Cyber personas are always fake, not real persons

3.

There is no difference between a person and a cyber persona

4. Incorrect:

Each person can have only one cyber persona

2. Question 2

/ 4

The cyber-persona layer represents an abstraction of which other layer(s) that develop a digital representation of an individual or entity identity in cyberspace?

1.

Physical-network layer

2.

Logical layer

Correct answer

3.

Physical layer

4.

Application layer

3. Question 3

/ 4

One of these items is NOT related to cyber trespassing:

1.

Viruses

Correct answer

2.

Destruction

3.

Alteration

4.

Deletion

4. Question 4

/ 4

Hacktivism commonly revolves around a variety of techniques meant to do what to the operational status of servers or computers?

1.

Restore

2.

Backup

3.

Save

4.

Disrupt

Correct answer

5. Question 5

/ 4

This group constitutes the largest and most substantial threat to cybersecurity:

1.

Script Kiddies

2.

Criminal Actors

Correct answer

3.

Phishers

4.

Hacktivist

6. Question 6

/ 4

Why might phishing be a concern for organizations?

1.

Workers expect their organizations to protect themselves.

2.

Workers trained on basic security can still be fooled into clicking a phishing link.

Correct answer

3.

Organizations allow all emails into their networks without protections.

4.

Organizations largely neglect to train their workers to recognize phishing scams.

7. Question 7

/ 4

Which of these is the primary means by which criminals manipulate human users?

1.

Deception

Correct answer

2.

Attacks

3.

Fraud

4.

Theft

8. Question 8

/ 4

Which of these is an anonymization technique to protect individuals’ online personas?

1.

ROT

2.

MAC

3.

ISP

4.

Tor

Correct answer

9. Question 9

/ 4

The use of a false cyber-persona may be appropriate when

1.

The other parties do not know it is a false cyber-persona

2.

All other cyber-personas are false too

3.

Participating in a virtual community or game

Correct answer

4.

It’s on behalf of human rights

10. Question 10

/ 4

The cyber-persona layer of cyberspace includes which of the following components?

1.

Digital identity

Correct answer

2.

Software

3.

Geographical

4.

Internet protocols

CYB 100 Wk 4 — Apply: Signature Assignment: Layers in Cyberspace Worksheet

Complete the Layers in Cyberspace Worksheet.

Submit your assignment.

CYB 100 Wk 5 — Practice: Knowledge Check

1. Question 1

/ 4

Cyberspace is wholly contained within

1.

The information environment

2.

The logical network

3.

All networked computers

4.

The internet

2. Question 2

/ 4

National cybersecurity is challenging because threats

1.

Mostly happen inside national borders

2.

Are almost always international

3.

Usually originate from other nations

4.

Do not abide to national borders

3. Question 3

/ 4

Why is it sometimes difficult to determine if computer problems are due to cyberattack?

1.

Computer problems are never caused by cyberattack.

2.

Cyber criminal activities are nearly impossible to detect.

3.

Cyberattacks are never aimed at disrupting hardware.

4.

Computer malfunctions can be the cause of problems.

4. Question 4

/ 4

Governance of the Internet is challenging the sovereign rights of states because international law

1.

Is only relevant in some cases

2.

Is irrelevant in cyberspace

3.

Recognizes legal and physical control

4.

Recognizes U.S. laws over other states

5. Question 5

/ 4

Which is a reason IoT devices are a point of weakness in the cybersecurity landscape?

1.

The open source software often used in IoT devices cannot be updated.

2.

IoT devices cannot use two-factor authentication.

3.

IoT devices’ security vulnerabilities are not easily patched.

4.

IoT devices do not require the same kind of security.

6. Question 6

/ 4

This is known as an ecosystem of connected sensors attached to everyday devices and appliances:

1.

IoT

2.

AI

3.

TOR

4.

AoT

7. Question 7

/ 4

Which of these is the condition of being free from observation or disruption by other people?

1.

Patience

2.

Politics

3.

Privacy

4.

Policies

8. Question 8

/ 4

Which one of the domestic security services groups below is not continuously being monitored in cyberspace?

1.

Spies

2.

Admins

3.

Terrorists

4.

Criminals

9. Question 9

/ 4

Which of the following may be considered the most challenging part of cybersecurity?

1.

Hardware

2.

Malware

3.

Viruses

4.

Humans

10. Question 10

/ 4

Which of these is a challenge created by the fast pace of technological changes?

1.

Laws and policies don’t keep the pace of the technological changes.

2.

Laws and policies constrict the pace of technological changes.

3.

Laws and policies change faster than technology.

4.

Laws and policies have no influence on technological changes

CYB 100 Wk 5 — Apply: Signature Assignment — Security Threat Awareness Infographic & Presentation

Imagine you are the Information Systems Security Officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company’s intranet and a brief presentation for the company’s stakeholders, including executives, managers, and staff.

Create a 1-page infographic or job aid of the cyber domain using the DoD or OSI model.

Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Create a 4- to 6-slide presentation.

Discuss the challenges of securing each layer of the cyber domain in the company’s cyber threat awareness training in your presentation.

Select 3 threats from your infographic or job aid.

Identify 2 challenges from the threats you identified.

Note: You do not need to identify how to mitigate the threat; this presentation is focused on raising awareness of cybersecurity threats and the challenges these threats present.

Format any references according to APA guidelines.

Submit your infographic and presentation.

--

--