Cybersecurity Essentials 1.1 Chapter 1
medical education employment
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)
Internet of Everything
What does the acronym IoE represent?
bring your own device
What does the term BYOD represent?
a weakness that makes a target susceptible to an attack
What does the term vulnerability mean?
break into computer networks with malicious intent
What is a Black hat Hacker
individual who uses hacking skills to identify security vulnerabilities in hardware, software or network
What is a White hat Hacker
What is an example of an Internet data domain?
Analyze
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
script kiddie
What name is given to a amateur hacker?
hactivist
What name is given to hackers who hack for a cause?
algorithm
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
DDoS
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
sharing cyber Intelligence information establishing early warning systems
Thwarting cyber criminals includes which of the following? (Choose two.)