Cybersecurity Essentials Chapter 1

01. Question
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Select one:

  • Analyze
  • Protect and Defend
  • Oversight and Development
  • Securely Provision

Explanation:
The “Analyze” category of the workforce framework includes specialty areas responsible for highly
specialized review and evaluation of incoming cybersecurity information to determine its usefulness.

02. Question
What name is given to hackers who hack for a cause? Select one:

  • blue hat
  • hactivist
  • hacker
  • white hat

Explanation:
The term is used to describe gray hackers who rally and protect for a cause.

03. Question
What name is given to a amateur hacker? Select one:

  • blue team
  • script kiddie
  • black hat
  • red hat

Explanation:
Script kiddies is a term used to describe inexperienced hackers.

04. Question
What does the term BYOD represent? Select one:

  • buy your own disaster
  • bring your own decision
  • bring your own disaster
  • bring your own device

Explanation:
The term bring-your-own-device is used to describe mobile devices such as smartphones,
tablets, and other devices.

05. Question
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
Select one:

  • ping sweep
  • spoof
  • DoS
  • DDoS

Explanation:
DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.

06. Question
Thwarting cyber criminals includes which of the following? (Choose two.) Select one or more:

  • hiring hackers
  • shutting down the network
  • sharing cyber Intelligence information
  • changing operating systems
  • establishing early warning systems

Explanation:
Organization can join efforts to thwart cyber crime by establishing early warning systems and sharing cyber intelligence.

07. Question
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.) Select one or more:

  • food
  • game
  • flight
  • medical
  • rock
  • employment
  • education

Explanation:
Employment, medical, and education records are important to protect because they contain personal information.

08. Question
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU? Select one:

  • APT
  • exhaustion
  • DDoS
  • algorithm

Explanation:
Algorithm attacks can force computers to use memory or overwork the CPU.

09. Question
What does the acronym IoE represent? Select one:

  • Internet of Everyday
  • Intelligence on Everything
  • Internet of Everything
  • Insight into Everything

Explanation:
Internet of Everything is the term used for Internet-connected devices.

10. Question
What is an example of an Internet data domain? Select one:

  • Juniper
  • Cisco
  • Linkedin
  • Palo Alto

Explanation:
A data domain is a repository for data.

11. Question
What does the term vulnerability mean? Select one:

  • a method of attack to exploit a target
  • a weakness that makes a target susceptible to an attack
  • a known target or victim machine
  • a computer that contains sensitive information
  • a potential threat that a hacker creates

Explanation:
A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.