Certification Checkpoint Chapter 1 - 4 Prep

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of ransomware

An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?

bluesnarfing

What are the three states of data? (Choose three.)

in-transit at rest in-process

What is the name given to a program or program code that bypasses normal authentication?

backdoor

What is identified by the first dimension of the cybersecurity cube?

goals

What name is given to hackers who hack for a cause?

hactivist

What are two common hash functions? (Choose two.)

SHA MD5

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DDoS

What does the acronym IoE represent?

Internet of Everything

What name is given to a storage device connected to a network?

NAS

What are three types of sensitive information? (Choose three.)

PII classified business

What are two common indicators of spam mail? (Choose two.)

The email has no subject line. The email has misspelled words or punctuation errors

What is a secure virtual network called that uses the public network?

VPN

What is the name for the type of software that generates revenue by generating annoying pop-ups?

adware

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

algorithm

What are two methods that ensure confidentiality? (Choose two.)

authentication encryption

What principle prevents the disclosure of information to unauthorized people, resources, and processes?

confidentiality

What are the three foundational principles of the cybersecurity domain? (Choose three.)

confidentiality availability integrity

What is the term used to describe the science of making and breaking secret codes?

cryptology

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

employment medical education

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

phishing

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

privacy

What name is given to a amateur hacker?

script kiddie

What three tasks are accomplished by a comprehensive security policy? (Choose three.)

sets rules for expected behavior defines legal consequences of violations gives security staff the backing of management

Thwarting cyber criminals includes which of the following? (Choose two.)

sharing cyber Intelligence information establishing early warning systems

Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?

smishing

What is a method of sending information from one device to another using removable media?

sneaker net

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

something you are something you have something you know

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

spear phishing

What three methods help to ensure system availability? (Choose three.)

system backups up-to-date operating systems equipment maintenance

What is the name of the method in which letters are rearranged to create the ciphertext?

transposition


Set pelajaran terkait

There is / There are (with pictures, questions en/es)

View Set

Skill 8.2, Verb Tense, Shifts, Subject-Verb Agreement ETC.

View Set

Pediatrics Exam 1 Practice Questions

View Set

HRM/498T Topic 1 Quick Check Week 1 Practice Topic Week 1 Practice Assignment

View Set