Chapter 1: Cyberspace, the Internet, and the World Wide Web
Test Bank
Multiple Choice
1. Which of the following best represents the contribution of IPS to the modern Internet?
a. smaller computers with greater capabilities
b. connected computers across university campuses
c. the first e-mail utility program
d. enabling data to be stored and moved as packets
Ans: A
Learning Objective 1-1: Explain how the Internet developed
Cognitive Domain: Knowledge
Answer Location: The Beginning of the Internet and Cyberspace
Difficulty Level: Medium
2. Development of the ______ resolved issues with hierarchical host names making it
easier for the average person to access the Internet.
a. MILNET
b. DNS
c. IPS
d. ARPANET
Ans: B
Learning Objective 1-1: Explain how the Internet developed
Cognitive Domain: Knowledge
Answer Location: Operations and Management Aspect
Difficulty Level: Medium
3. The opportunity to create new businesses and markets online best describes which
aspect of Internet development?
a. operations and management
b. social
c. commercialization
d. e-mail
Ans: C
Learning Objective 1-2: Explain the purpose of the Internet
Cognitive Domain: Knowledge
Answer Location: Commercialization Aspect
Difficulty Level: Easy
4. According to the text, the Internet was built to be a free and open access tool. Which
of the following best represents this concept?
a. Napster
, Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
b. eBay
c. Amazon
d. Google
Ans: A
Learning Objective 1-2: Explain the purpose of the Internet
Cognitive Domain: Application
Answer Location: Social Aspect
Difficulty Level: Medium
5. The inventors of the Internet likely didn’t consider ______ during its development.
a. free exchange of data
b. criminal abuse of the Internet
c. use as a research tool
d. open access to information
Ans: B
Learning Objective 1-3: Describe what “vulnerabilities” are
Cognitive Domain: Comprehension
Answer Location: Vulnerabilities of the Internet
Difficulty Level: Easy
6. Whereas in the past criminals had to physically approach their victims to carry out a
crime, the Internet allows offenders to be in other states, or even continents, and still
carry out the same crime. This best represents which of the following vulnerabilities of
the Internet?
a. anonymity/identity
b. time and space
c. asymmetries of cyberspace
d. lack of barriers to entry
Ans: B
Learning Objective 1-3: Describe what “vulnerabilities” are
Cognitive Domain: Comprehension
Answer Location: Time and Space
Difficulty Level: Easy
7. ______ is a weakness in a product that could allow an attacker to compromise the
integrity, availability, or confidentiality of that product.
a. Security vulnerability
b. Cyber security
c. Computer virus
d. Cyber attack
Ans: A
Learning Objective 1-3: Describe what “vulnerabilities” are
Cognitive Domain: Comprehension
Answer Location: Vulnerabilities of the Internet
Difficulty Level: Easy
, Instructor Resource
Kremling, Cyberspace, Cybersecurity, and Cybercrime
SAGE Publishing, 2018
8. The ______ of the Internet might be a concern for parents regarding who their
children may be talking to online.
a. anonymity/identity
b. time and space
c. asymmetries of cyberspace
d. lack of barriers to entry
Ans: A
Learning Objective 1-3: Describe what “vulnerabilities” are
Cognitive Domain: Knowledge
Answer Location: Vulnerabilities of the Internet
Difficulty Level: Easy
9. The Internet provides opportunities for criminals to cause significant damage with
minimum resources. For example, in 2017, the WannaCry ransomware attack resulted
in several billion dollars of damage. This best represents which vulnerability of the
Internet?
a. time and space
b. anonymity/identity
c. asymmetries of cyberspace
d. 1s and 0s
Ans: C
Learning Objective 1-4: Discuss how criminals are benefiting from the Internet
Cognitive Domain: Comprehension
Answer Location: Asymmetries of Cyberspace
Difficulty Level: Easy
10. Countries concerned with controlling the flow of information and goods online would
be most concerned with which of the following aspects of the Internet?
a. anonymity/identity
b. time and space
c. asymmetries of cyberspace
d. lack of barriers to entry
Ans: D
Learning Objective 1-2: Explain the purpose of the Internet
Cognitive Domain: Comprehension
Answer Location: Lack of Barriers to Entry
Difficulty Level: Easy
11. Internet users generally struggle with identifying when their computer has been
attacked. In order to quickly respond to a cyberattack on their system, a user would
have to be able to overcome which of the following Internet threats?
a. time and space
b. anonymity/identity
c. lack of barriers to entry
d. 1s and 0s
Ans: D
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller evileye251. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R480,40. You're not tied to anything after your purchase.