INFOASEC cybersec1 Flashcards

1
Q

(GIS)

A

Geospatial Information
Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

group of criminals breaks into computers or networks to
gain access for various reasons.

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

break into networks or computer
systems to discover weaknesses in order to improve the
security of these systems.

A

White hat attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

between white and black
hat attackers. The gray hat attackers may find a
vulnerability and report it to the owners of the system if
that action coincides with their agenda.

A

Gray hat attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unethical criminals who violate
computer and network security for personal gain, or for
malicious reasons, such as attacking networks.

A

Black hat attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Teenagers or hobbyists mostly limited to pranks
and vandalism, have little or no skill, often using existing tools
or instructions found on the Internet to launch attacks.

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Grey hat hackers who rally and protest against
different political and social ideas.

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

e black hat hackers who are either
self-employed or working for large cybercrime organizations

A

Cyber Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

, these are either white hat or black hat hackers
who steal government secrets, gather intelligence, and

A

State Sponsored Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CVE

A

Common Vulnerabilities
and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

displays real-time visualization of attacks.

A
  • Early Warning Systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a weakness that makes a target susceptible to
an attack

A
  • Cyber vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the possibility that a harmful event, such as
an attack, will occur

A

cybersecurity threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

recognize the threat that data poses if used
against people

A
  • Cybersecurity specialists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A tool to capture
data streams over a network.

A

packet-sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

interferes
with an established network communication by
constructing packets to appear as if they are part
of a communication.

A
  • Packet forgery
16
Q

(NSA)

A

National Security Agency

17
Q

the collection of
technologies that enable the connection of various
devices to the Internet.

A

IOT

18
Q

is the result of data sets that are large and
complex, making traditional data processing
applications inadequate.

A

BIG DATA

19
Q

a continuous computer hack
that occurs under the radar against a specific object

A
  • Advanced persistent threat
20
Q

(APT)

A

Advanced persistent threat

21
Q

(TDoS)

A

telephone denial of service

22
Q

(NIST)

A

National Institute of Standards and
Technologies

23
Q

includes providing the
support, administration, and maintenance required
to ensure IT system performance and security

A

Operate and Maintain

24
Q

includes the identification,
analysis, and mitigation of threats to internal
systems and networks

A

Protect and Defend

25
Q

includes the investigation of cyber
events and/or cyber crimes involving IT resources

A
  • Investigate
26
Q

includes specialized denial and
deception operations and the collection of
cybersecurity information

A
  • Collect and Operate
27
Q

includes highly specialized review and
evaluation of incoming cybersecurity information to
determine if it is useful for intelligence

A

Analyze

28
Q

provides for leadership,
management, and direction to conduct
cybersecurity work effectively

A

Oversight and Development

29
Q

is an
intermediate-level certification asserts that cybersecurity
specialists holding this credential possess the skills and
knowledge for various hacking practices.

A
  • EC-Council Certified Ethical Hacker
30
Q

Cybersecurity specialists responsible for managing,
developing and overseeing information security systems at
the enterprise level or for those developing best security
practices can qualify for CISM.

A

Certified Information Security Manager

31
Q

The CCNA Security certification validates that a cybersecurity
specialist has the knowledge and skills required to secure
Cisco networks.

A

Cisco Certified Network Associate Security

32
Q
A