Cybersecurity essentials chapter 1 quiz Welcome to Cybersecurity essentials chapter 1 quiz What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence? Select one: Securely Provision Oversight and Development Analyze Protect and Defend None What name is given to hackers who hack for a cause? Select one: blue hat hacker hactivist white hat None What name is given to a amateur hacker? Select one: blue team script kiddie black hat red hat None What does the term BYOD represent? Select one: buy your own disaster bring your own decision bring your own disaster bring your own device None What type of attack uses many systems to flood the resources of a target, thus making the target unavailable? Select one: ping sweep spoof DDoS DoS None Thwarting cyber criminals includes which of the following? (Choose two.) Select one or more: hiring hackers shutting down the network sharing cyber Intelligence information changing operating systems establishing early warning systems Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.) Select one or more: food game education medical rock employment flight What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU? Select one: APT exhaustion DDoS algorithm None What does the acronym IoE represent? Select one: Internet of Everyday Intelligence on Everything Insight into Everything Internet of Everything None What is an example of an Internet data domain? Select one: Juniper Cisco Palo Alto Linkedin None What does the term vulnerability mean? Select one: a method of attack to exploit a targe a known target or victim machine a weakness that makes a target susceptible to an attack a computer that contains sensitive information a potential threat that a hacker creates None