Fundamentals of IT and Cybersecurity Chapter 1 Study Guide

Ace your homework & exams now with Quizwiz!

what does the term BYOD represent?

bring your own device

which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information?

Black hat hackers

what groups of people are considered internal attackers?

ex-employees trusted partners

A cybersecurity specialist is asked to identify the potential criminals known to attack the organization which type of hackers would the cybersecurity specialist be least concerned with?

White hat Hacker

what are examples of an internet data domain?

bilat linkedin

what are examples of early warning systems that can be used to thwart cybercriminals?

Honeynet project

what are the motivations of hacktivists?

They are part of a protest group behind a political cause

what are ways of thwarting cyber criminals?

sharing cyber intelligence establishing early warning systems

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Analyze

what name is given to a amateur hacker?

script kiddie

what type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DDos

what does the acronym IoE represent?

Internet of everything

Technologies like GIS and IoE contribute to the growth of large data stores. What are the reasons that these technologies increase the need for cybersecurity specialists?

They collect sensitive information They contain personal information

A specialist in the HR department is invited to promote the cybersecurity program in community schools. what topics would the specialist emphasize in the presentation to draw students to this field?

a career field in high demand service to the public high earning potential

what does the term vulnerability mean

a weakness that makes a target susceptible to an attack

what type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

algorithm

what name is given to hackers who hack for a cause?

hactavist

list the types of records that cyber criminals would be interested in stealing from organizations

medical, employment, education

Which type of cybercriminal attack would interfere with established network communication through the use of constructed packets look like they are part of the normal communication?

packet forgery


Related study sets

ECO2013 Exam 1 Pearson Questions

View Set

Emissions Control Systems and Components

View Set

Chronic: Exam 2: Chapter 41: PREP U

View Set

Business Ethics Now Test (Ch. 1-2)

View Set

Network+ Chapter 1 - Review Questions

View Set