CNT 105 CH 1 Quiz
What name is given to hackers who hack for a cause? white hat hacker blue hat hactivist
hacktivist
What does the acronym IoE represent? Internet of Everything Intelligence on Everything Insight into Everything Internet of Everyday
Internet of Everything
What is an example of an Internet data domain? LinkedIn Palo Alto Cisco Juniper
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU? algorithm APT exhaustion DDoS
algorithm
What name is given to a amateur hacker? black hat red hat script kiddie blue team
script kiddie
Thwarting cyber criminals includes which of the following? (Choose two.) establishing early warning systems shutting down the network sharing cyber Intelligence information hiring hackers changing operating systems
sharing cyber Intelligence information establishing early warning systems
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.) game medical food education employment flight rock
medical education employment
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence? Protect and Defend Oversight and Development Securely Provision Analyze
Analyze
What does the term BYOD represent? bring your own disaster bring your own decision bring your own device buy your own disaster
bring your own device
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable? DoS Spoof DDoS ping sweep
DDoS
What does the term vulnerability mean? a weakness that makes a target susceptible to an attack a computer that contains sensitive information a method of attack to exploit a target a known target or victim machine a potential threat that a hacker creates
a weakness that makes a target susceptible to an attack