Cyber Security Fundamentals 2020 Pre-Test
What is a hash function
A fixed-length string of numbers and letters generated from a mathematical algorithm and an arbitrarily sized message such as an email, document, picture or other type of data.
What does an Incident Response Plans allows for
A timely and controlled response to security incidents, and attempts to mitigate any damage or lose
How can I protect myself against fake antiviruses
All
How often do all cybersecurity workforce personnel take the Cybersecurity Fundamental training IAW DA PAM 25-2-6
Every 3 years
Cybersecurity is not a holistic program to manage Information Technology related security risk
False
In accordance with AR 25-2, whose responsibility is it to ensure all users receive initial and annual IA awareness training?
IASO
What does LAMP stands for
Linux , Apache, My SQL and PHP
A Botnet is a term derived from the idea of bot networks In its most basic form, a bot is simply an automated computer program, or robot
True
A security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements
True
Are website defacement and DoS possible cyberattacks against websites
True