CYB 100 UP Importance of Each Layer in Cyberspace Questions

Layers of the Cyber Domain Worksheet

Is one layer of the cyberspace domain more important than another? If yes, explain which layer is the most important. If not, explain why.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • What security threats or risks can impact multiple layers? Explain your answer.
  • How can the layers help to manage the security threats or risks individually?
  • How can the layers work collectively for the same purpose, managing security threats or risks?
  • Which layer of cyberspace is the most targeted or vulnerable?
  • How do culture and ethics play a role in cyberspace?
  • Question 1
  • Which of the following is not a type of malware?

  • Virus
  • Trojan
  • Rootkit
  • Encryption
  • Question 2
  • Does the U.S. consider cyberspace similar to land, sea, air, and space?

  • Yes, but it cannot be defended by anyone.
  • No, it is global and a completely free space.
  • Yes, it must be defended like other terrains.
  • No, it has no borders and is not like other terrains.
  • Question 3
  • Which of the following is not a step in the cyber kill chain?

  • Installation
  • Extraction
  • Weaponization
  • Exploitation
  • Question 4
  • Which of the following terms is used to describe any software that harms a computer or its data?

    Save Time On Research and Writing
    Hire a Pro to Write You a 100% Plagiarism-Free Paper.
    Get My Paper
  • TCP
  • Social engineering
  • Malware
  • Botnet
  • Question 5
  • The

  • World Wide Web Consortium
  • (W3C) manages the development of the protocols associated with the World Wide Web, usually accessed via which of the following?

  • Persona layer
  • A home network
  • A mobile network
  • A browser
  • Question 6
  • During early development of the internet, governance discussions focused on interoperability and which of the following?

  • Efficiency
  • Politics
  • Protocols
  • Security
  • Question 7
  • Who was the NSA contractor that became a whistleblower, revealing spying tactics of the United States?

  • Mark Raymond
  • Janet Abbate
  • Edward Snowden
  • Steven Levy
  • Question 8
  • Overt and covert malware does not attack which of the following?

  • Businesses
  • Critical infrastructure
  • Individual
  • s

  • Hackers
  • Question 9
  • Governance of the internet is challenging the sovereign rights of states because international law

  • Recognizes U.S. laws over other states
  • Is irrelevant in cyberspace
  • Recognizes legal and physical control
  • Is only relevant in some cases
  • Question 10
  • Which of the following issues digital certificates and certifies the ownership of a public key by the named subject of a certificate?

  • Certificate authority
  • World Wide Web Consortium

  • Internet Engineering Task Force
  • Internet service provider
  • Question 11
  • Which is a feature of malware?

  • Polymorphic
  • Polyphonic
  • Spyware
  • Individual

  • Question 12
  • A virus is an example of a threat to which layer’s security?

  • Personal security
  • Logical security
  • Physical security
  • Network security
  • Question 13
  • Which of the following describes a cyber capability but not a kinetic capability?

  • Not returnable
  • Costly to develop
  • Costly to maintain
  • More easily reversible
  • Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER