Fundamentals of IT and Cybersecurity Chapter 1 Study Guide
what does the term BYOD represent?
bring your own device
which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information?
Black hat hackers
what groups of people are considered internal attackers?
ex-employees trusted partners
A cybersecurity specialist is asked to identify the potential criminals known to attack the organization which type of hackers would the cybersecurity specialist be least concerned with?
White hat Hacker
what are examples of an internet data domain?
bilat linkedin
what are examples of early warning systems that can be used to thwart cybercriminals?
Honeynet project
what are the motivations of hacktivists?
They are part of a protest group behind a political cause
what are ways of thwarting cyber criminals?
sharing cyber intelligence establishing early warning systems
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Analyze
what name is given to a amateur hacker?
script kiddie
what type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
DDos
what does the acronym IoE represent?
Internet of everything
Technologies like GIS and IoE contribute to the growth of large data stores. What are the reasons that these technologies increase the need for cybersecurity specialists?
They collect sensitive information They contain personal information
A specialist in the HR department is invited to promote the cybersecurity program in community schools. what topics would the specialist emphasize in the presentation to draw students to this field?
a career field in high demand service to the public high earning potential
what does the term vulnerability mean
a weakness that makes a target susceptible to an attack
what type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
algorithm
what name is given to hackers who hack for a cause?
hactavist
list the types of records that cyber criminals would be interested in stealing from organizations
medical, employment, education
Which type of cybercriminal attack would interfere with established network communication through the use of constructed packets look like they are part of the normal communication?
packet forgery