Cybersecurity Essentials 1.1 Chapter 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

medical education employment

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

Internet of Everything

What does the acronym IoE represent?

bring your own device

What does the term BYOD represent?

a weakness that makes a target susceptible to an attack

What does the term vulnerability mean?

break into computer networks with malicious intent

What is a Black hat Hacker

individual who uses hacking skills to identify security vulnerabilities in hardware, software or network

What is a White hat Hacker

Linkedin

What is an example of an Internet data domain?

Analyze

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

script kiddie

What name is given to a amateur hacker?

hactivist

What name is given to hackers who hack for a cause?

algorithm

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

DDoS

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

sharing cyber Intelligence information establishing early warning systems

Thwarting cyber criminals includes which of the following? (Choose two.)


Conjuntos de estudio relacionados

Connect Assignment: Chapter 1 Matter and Energy

View Set

好词好句 (4) good sentences for emotion

View Set

Child Development Laura Berk Chapter 1

View Set

Data Structures - Array Based Queue

View Set

Geology Lab: Common Minerals and Their Uses

View Set