Layers of the Cyber Domain Worksheet
Is one layer of the cyberspace domain more important than another? If yes, explain which layer is the most important. If not, explain why.
Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
What security threats or risks can impact multiple layers? Explain your answer.
How can the layers help to manage the security threats or risks individually?
How can the layers work collectively for the same purpose, managing security threats or risks?
Which layer of cyberspace is the most targeted or vulnerable?
How do culture and ethics play a role in cyberspace?
Question 1
Which of the following is not a type of malware?
Virus
Trojan
Rootkit
Encryption
Question 2
Does the U.S. consider cyberspace similar to land, sea, air, and space?
Yes, but it cannot be defended by anyone.
No, it is global and a completely free space.
Yes, it must be defended like other terrains.
No, it has no borders and is not like other terrains.
Question 3
Which of the following is not a step in the cyber kill chain?
Installation
Extraction
Weaponization
Exploitation
Question 4
Which of the following terms is used to describe any software that harms a computer or its data?
Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
TCP
Social engineering
Malware
Botnet
Question 5
The
World Wide Web Consortium
(W3C) manages the development of the protocols associated with the World Wide Web, usually accessed via which of the following?
Persona layer
A home network
A mobile network
A browser
Question 6
During early development of the internet, governance discussions focused on interoperability and which of the following?
Efficiency
Politics
Protocols
Security
Question 7
Who was the NSA contractor that became a whistleblower, revealing spying tactics of the United States?
Mark Raymond
Janet Abbate
Edward Snowden
Steven Levy
Question 8
Overt and covert malware does not attack which of the following?
Businesses
Critical infrastructure
Individual
s
Hackers
Question 9
Governance of the internet is challenging the sovereign rights of states because international law
Recognizes U.S. laws over other states
Is irrelevant in cyberspace
Recognizes legal and physical control
Is only relevant in some cases
Question 10
Which of the following issues digital certificates and certifies the ownership of a public key by the named subject of a certificate?
Certificate authority
World Wide Web Consortium
Internet Engineering Task Force
Internet service provider
Question 11
Which is a feature of malware?
Polymorphic
Polyphonic
Spyware
Individual
Question 12
A virus is an example of a threat to which layer’s security?
Personal security
Logical security
Physical security
Network security
Question 13
Which of the following describes a cyber capability but not a kinetic capability?
Not returnable
Costly to develop
Costly to maintain
More easily reversible
Turn in your highest-quality paper
Get a qualified writer to help you with
“ CYB 100 UP Importance of Each Layer in Cyberspace Questions ”
Get high-quality paper
NEW! AI matching with writer