CEIS101-C Module 6
A data breach can happen _________________.
All of the choices are correct
Choose examples of personally identifiable information (check all that apply).
Birth date Vehicle identification number Bank Account Number
What is the goal of a black hat hacker?
Stealing data
What is the goal of a white hat hacker?
Protecting data
Cybercriminal looks for a weakness Attacks information through socialization channels like email or on premises Cybercriminal makes initial contact with the target Cybercriminal extracts and transmits data back to themselves Attacker uses infrastructure, system, and application weaknesses
Researches Attack Social Attack Attack Exfiltration Network Attack