CYBERSECURITY CHAPTER 1 QUIZ STUDY GUIDE
Q8 Answer
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)
Q7 Answer
What does the acronym IoE represent?
Q6 Answer
What does the term BYOD represent?
Q2 Answer
What does the term vulnerability mean?
Q11 Answer
What is an example of an Internet data domain?
Q4 Answer
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Q5 Answer
What name is given to a amateur hacker?
Q1 Answer
What name is given to hackers who hack for a cause?
Q9 Answer
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
Q10 Answer
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
Q3 Answer
Thwarting cyber criminals includes which of the following? (Choose two.)