Importance of Each Layer in Cyberspace
Layers of the Cyber Domain Worksheet
Is one layer of the cyberspace domain more important than another? If yes, explain which layer is the most important. If not, explain why.
What security threats or risks can impact multiple layers? Explain your answer.
How can the layers help to manage the security threats or risks individually?
How can the layers work collectively for the same purpose, managing security threats or risks?
Which layer of cyberspace is the most targeted or vulnerable?
How do culture and ethics play a role in cyberspace?
Question 1
Which of the following is not a type of malware?
Virus
Trojan
Rootkit
Encryption
Question 2
Does the U.S. consider cyberspace similar to land, sea, air, and space?
Yes, but it cannot be defended by anyone.
No, it is global and a completely free space.
Yes, it must be defended like other terrains.
No, it has no borders and is not like other terrains.
Question 3
Which of the following is not a step in the cyber kill chain?
Installation
Extraction
Weaponization
Exploitation
Question 4
Which of the following terms is used to describe any software that harms a computer or its data?
TCP
Social engineering
Malware
Botnet
Question 5
The World Wide Web Consortium (W3C) manages the development of the protocols associated with the World Wide Web, usually accessed via which of the following?
Persona layer
A home network
A mobile network
A browser
Question 6
During early development of the internet, governance discussions focused on interoperability and which of the following?
Efficiency
Politics
Protocols
Security
Question 7
Who was the NSA contractor that became a whistleblower, revealing spying tactics of the United States?
Mark Raymond
Janet Abbate
Edward Snowden
Steven Levy
Question 8
Overt and covert malware does not attack which of the following?
Businesses
Critical infrastructure
Individuals
Hackers
Question 9
Governance of the internet is challenging the sovereign rights of states because international law
Recognizes U.S. laws over other states
Is irrelevant in cyberspace
Recognizes legal and physical control
Is only relevant in some cases
Question 10
Which of the following issues digital certificates and certifies the ownership of a public key by the named subject of a certificate?
Certificate authority
World Wide Web Consortium
Internet Engineering Task Force
Internet service provider
Question 11
Which is a feature of malware?
Polymorphic
Polyphonic
Spyware
Individual
Question 12
A virus is an example of a threat to which layer’s security?
Personal security
Logical security
Physical security
Network security
Question 13
Which of the following describes a cyber capability but not a kinetic capability?
Not returnable
Costly to develop
Costly to maintain
More easily reversible
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
