Charter 1: Security 284

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What does the term vulnerability mean?

a weakness that makes a target susceptible to an attack A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

1. employment, 2. education, 3.medical Employment, medical, and education records are important to protect because they contain personal information.

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DDoS DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

What does the acronym IoE represent?

Internet of Everything Internet of Everything is the term used for Internet-connected devices

What is an example of an Internet data domain?

Linkedin A data domain is a repository for data.

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

algorithm Algorithm attacks can force computers to use memory or overwork the CPU.

What does the term BYOD represent?

bring your own device The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,

Thwarting cyber criminals includes which of the following? (Choose two.)

1. establishing early warning systems and 2. sharing cyber Intelligence information. Organization can join efforts to thwart cyber crime by establishing early warning systems and sharing cyber intelligence.

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Analyze The "Analyze" category of the workforce framework includes specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness.

What name is given to hackers who hack for a cause?

hactivist The term is used to describe gray hackers who rally and protect for a cause.

What name is given to a amateur hacker?

script kiddie Script kiddies is a term used to describe inexperienced hackers.


Set pelajaran terkait

Chapter 15: Infection Control and the Dental Radiographer

View Set

Fundamentals Exam 4: Case Study/EAQ/ZoomReview

View Set