Cybersecurity Essentials 1.13 – CE – Chapter 1 Quiz Answers
-
What name is given to hackers who hack for a cause?
- hactivist
- hacker
- white hat
- blue hat
Answers Explanation & Hints:
The term is used to describe gray hackers who rally and protect for a cause.
-
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
- Analyze
- Protect and Defend
- Securely Provision
- Oversight and Development
Answers Explanation & Hints:
The “Analyze” category of the workforce framework includes specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness.
-
What does the term BYOD represent?
- bring your own disaster
- bring your own decision
- bring your own device
- buy your own disaster
Answers Explanation & Hints:
The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices,
-
What does the term vulnerability mean?
- a computer that contains sensitive information
- a known target or victim machine
- a method of attack to exploit a target
- a weakness that makes a target susceptible to an attack
- a potential threat that a hacker creates
Answers Explanation & Hints:
A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.
-
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
- APT
- DDoS
- exhaustion
- algorithm
Answers Explanation & Hints:
Algorithm attacks can force computers to use memory or overwork the CPU.
-
What name is given to a amateur hacker?
- script kiddie
- blue team
- black hat
- red hat
Answers Explanation & Hints:
Script kiddies is a term used to describe inexperienced hackers.
-
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)
- flight
- food
- game
- employment
- rock
- medical
- education
Answers Explanation & Hints:
The correct answers are: medical, education, employment
-
What is an example of an Internet data domain?
- Juniper
- Palo Alto
- Cisco
Answers Explanation & Hints:
A data domain is a repository for data.
-
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
- DoS
- ping sweep
- spoof
- DDoS
Answers Explanation & Hints:
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
-
Thwarting cyber criminals includes which of the following? (Choose two.)
- hiring hackers
- sharing cyber Intelligence information
- shutting down the network
- changing operating systems
- establishing early warning systems
Answers Explanation & Hints:
Organization can join efforts to thwart cyber crime by establishing early warning systems and sharing cyber intelligence.
-
What does the acronym IoE represent?
- Internet of Everyday
- Internet of Everything
- Intelligence on Everything
- Insight into Everything
Answers Explanation & Hints:
Internet of Everything is the term used for Internet-connected devices