Chap 1
internet of everything
What does the acronym IoE represent?
bring your own device
What does the term BYOD represent?
What is an example of an Internet data domain?
analyze
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence? -Securely Provision -Analyze -Oversight and Development -Protect and Defend
script kiddie
What name is given to a amateur hacker?
hacktivist
What name is given to hackers who hack for a cause?
employement, education, medical
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.) -rock -flight -game -employment -education -medical
sharing cyber Intelligence information establishing early warning systems
Thwarting cyber criminals includes which of the following? (Choose two.) -hiring hackers -sharing cyber Intelligence information -establishing early warning systems -changing operating systems -shutting down the network
DDOS
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
a weakness that makes a target susceptible to an attack
what does the term vulnerability mean? -a computer that contains sensitive information -a known target or victim machine -a potential threat that a hacker creates -a method of attack to exploit a target -a weakness that makes a target susceptible to an attack
algorithm
what type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?