Home
contacto
Radio
cursos
Home
contacto
Radio
cursos
Cybersecurity Quiz
1. What role did Alex Stamos previously hold?
a) Chief Technology Officer of Facebook
b) Chief Security Officer of Facebook
c) Chief Information Officer of Facebook
d) Security Analyst at Facebook
2. At which university does Alex Stamos currently teach?
a) Harvard University
b) Stanford University
c) MIT
d) Yale University
3. What does Alex Stamos focus on in his research and teaching?
a) Data collection techniques
b) International security and cooperation
c) Artificial Intelligence
d) Cloud computing
4. According to Stamos, how are U.S. hackers different from those in Russia and China?
a) U.S. hackers work as freelancers
b) U.S. hackers are usually civilians working directly for the government
c) U.S. hackers work on personal projects alongside government tasks
d) U.S. hackers operate with minimal funding
5. What does Stamos suggest is an issue with the incentives for U.S. cyber units?
a) They are not rewarded for defensive efforts
b) They lack proper funding for operations
c) They receive excessive public recognition
d) They focus solely on international attacks
6. Which two organizations in other countries does Stamos mention as examples of defensive cybersecurity agencies?
a) MI6 in the UK and the FSB in Russia
b) BSI in Germany and ANSSI in France
c) CIA in the U.S. and MI5 in the UK
d) NSA in the U.S. and GCHQ in the UK
7. Stamos highlights a problematic norm regarding cyberattacks. What is it?
a) Hackers can work without accountability
b) Hacking is only punishable if it affects military targets
c) Nations often ignore cyberattacks as normal occurrences
d) Cyberattacks are restricted by international agreements
8. What does Stamos say is one major issue with third-party libraries in mobile apps?
a) They are essential for app functionality
b) They are often secure and well-regulated
c) They often contain features for targeted advertising
d) They sometimes perform invasive activities
9. What solution does Stamos propose for better regulation of data use in the U.S.?
a) Eliminating all data collection
b) Dividing data based on its purpose
c) Encouraging data collection only for military use
d) Increasing unrestricted data access
10. What does Stamos believe makes it difficult to create a balanced cybersecurity framework?
a) Inconsistent international cooperation
b) Linear relationships between different security goals
c) Complex, non-linear trade-offs between security goals
d) Lack of technological advancements
Check Answers
tcr english