Skip to main content
Workforce LibreTexts

6.8: Study Questions

  • Page ID
    10024
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    Study Questions

    1. Briefly define the three components of the information security triad
    2. Explain what authentication means
    3. Give two examples of a complex password
    4. Give three examples of threat actors
    5. Name two motivations of hacktivists to commit cybercrime
    6. List five ways to defend against cyber attacks
    7. List three examples of PII
    8. Briefly explain the role of SOC
    9. Explain the purpose of security policies
    10. Explain how information availability related to a successful organization

    Exercises

    1. Research and analyze cybersecurity incidents to come up with scenarios of how organizations can prevent an attack.
    2. Discuss some IoT (Internet of Things) application vulnerabilities with non-techie and techie technology users, then compare and contrast their different perspectives and reactions to IoT vulnerabilities.
    3. Describe one multi-factor authentication method that you have experienced and discuss the pros and cons of using multi-factor authentication.
    4. Identify the password policy at your place of employment or study. Assess if it is a good policy or not. Explain.
    5. Take inventory of possible security threats that your home devices may be exposed to. List them and discuss their potential effects and what you plan to do about them.
    6. Recall when you last back up your data. Discuss the method you use. Define a backup policy for your home devices.
    7. Research the career of a SOC professional. Report what certificate training it requires to become SOC professionals, what the demand is for this career, and their salary range.

    • Was this article helpful?