TEST Flashcards
What name is given to a amateur hacker?
A Select one:
B blue team
C script kiddie
D black hat
E red hat
C script kiddie
What is an example of an Internet data domain?
Select one:
A Cisco
B LinkedIn
C Palo Alto
D Juniper
B LinkedIn
Thwarting cyber criminals includes which of the following? (Choose two.)
Select one or more:
A hiring hackers
B sharing cyber Intelligence information
C shutting down the network
D changing operating systems
E establishing early warning systems
B sharing cyber Intelligence information//
E establishing early warning systems//
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Select one:
A Analyze
B Securely Provision
C Oversight and Development
D Protect and Defend
A Analyze//
.What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
Select one:
A APT
B DDoS
C Exhaustion
D Algorithm
D Algorithm//
What name is given to hackers who hack for a cause?
Select one:
A Hactivist
B blue hat
C hacker
D white hat
A Hactivist//
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
Select one:
A ping sweep
B DoS
C DDoS
D Spoof
C DDoS//
What does the term vulnerability mean?
Select one:
A a known target or victim machine
B a potential threat that a hacker creates
C a method of attack to exploit a target
D a weakness that makes a target susceptible to an attack
E a computer that contains sensitive information
D a weakness that makes a target susceptible to an attack//
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)
Select one or more:
A Medical
B food
C rock
D flight
E game
F education
G employment
A Medical//
F education//
G employment//
What does the term BYOD represent?
Select one:
A bring your own device
B buy your own disaster
C bring your own decision
D bring your own disaster
A bring your own device//
What is a secure virtual network called that uses the public network?
Select one:
A IPS
B Firewall
C VPN
D NAC
E IDS
F MPLS
C VPN//
Which two methods help to ensure data integrity? (Choose two.)
Select one or more:
A data consistency checks
B privacy
C repudiation
D variability
E hashing
F authorization
A data consistency checks//
E hashing//
What mechanism can organizations use to prevent accidental changes by authorized users?
Select one:
A hashing
B backups
C SHA-1
D encryption
E version control
E version control//
For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
Select one or more
A something you are
B something you know
C something you have
E something you do
F where you are
A something you are//
B something you know//
C something you have//
What are the three foundational principles of the cybersecurity domain? (Choose three.)
Select one or more:
A Integrity
B security
C policy
E encryption
F availability
G confidentiality
A Integrity//
F availability//
G confidentiality//