Cybersecurity Essentials 1.1 Chapter 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

medical education employment

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

Internet of Everything

What does the acronym IoE represent?

bring your own device

What does the term BYOD represent?

a weakness that makes a target susceptible to an attack

What does the term vulnerability mean?

break into computer networks with malicious intent

What is a Black hat Hacker

individual who uses hacking skills to identify security vulnerabilities in hardware, software or network

What is a White hat Hacker

Linkedin

What is an example of an Internet data domain?

Analyze

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

script kiddie

What name is given to a amateur hacker?

hactivist

What name is given to hackers who hack for a cause?

algorithm

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

DDoS

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

sharing cyber Intelligence information establishing early warning systems

Thwarting cyber criminals includes which of the following? (Choose two.)


Set pelajaran terkait

Connect Assignment: Chapter 1 Matter and Energy

View Set

好词好句 (4) good sentences for emotion

View Set

Chapters 54, 55, 57, 58, & 59 (Wolters Kluwer Focus on Nursing Pharmacology Amy M. Karch 8th edition)

View Set

Child Development Laura Berk Chapter 1

View Set

Data Structures - Array Based Queue

View Set