What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
ping sweep
DoS
spoof
DDoS
DDoS
Explanation: DDoS is is an attack that involves multiple systems. DoS involves only a single attack system.
What does the term vulnerability mean?
a known target or victim machine
a weakness that makes a target susceptible to an attack
a potential threat that a hacker creates
a computer that contains sensitive information
a method of attack to exploit a target
a weakness that makes a target susceptible to an attack
Explanation: A vulnerability is not a threat, but it is a weakness that makes the PC or the software a target for attacks.
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Protect and Defend
Securely Provision
Oversight and Development
Analyze
Analyze
Explanation: The “Analyze” category of the workforce framework includes specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness.
Thwarting cyber criminals includes which of the following? (Choose two.)
hiring hackers
shutting down the network
sharing cyber Intelligence information
establishing early warning systems
changing operating systems
sharing cyber Intelligence information
establishing early warning systems
Explanation: Organization can join efforts to thwart cyber crime by establishing early warning systems and sharing cyber intelligence.
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
DDoS
exhaustion
APT
algorithm
algorithm
Explanation: Algorithm attacks can force computers to use memory or overwork the CPU.
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)
food
rock
medical
flight
game
education
employment
medical
education
employment
Explanation: Employment, medical, and education records are important to protect because they contain personal information.
What name is given to a amateur hacker?
script kiddie
blue team
red hat
black hat
script kiddie
Explanation: Script kiddies is a term used to describe inexperienced hackers.
What name is given to hackers who hack for a cause?
white hat
hactivist
hacker
blue hat
hacktivist
Explanation: The term is used to describe gray hackers who rally and protect for a cause.
What does the term BYOD represent?
bring your own decision
bring your own disaster
buy your own disaster
bring your own device
bring your own device
Explanation: The term bring-your-own-device is used to describe mobile devices such as iPhones, smartphones, tablets, and other devices
What is an example of an Internet data domain?
Palo Alto
Cisco
Juniper
Linkedin
Linkedin
Explanation: A data domain is a repository for data.
What does the acronym IoE represent?
Insight into Everything
Internet of Everything
Intelligence on Everything
Internet of Everyday
Explanation: Internet of Everything is the term used for Internet-connected devices
Internet of Everything
Explanation: Internet of Everything is the term used for Internet-connected devices
What is identified by the first dimension of the cybersecurity cube?
tools
knowledge
goals
safeguards
rules
goals
Explanation: The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.
What are three types of sensitive information? (Choose three.)
declassified
public
PII
business
published
classified
PII
business
classified
Explanation: Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.
What are two common hash functions? (Choose two.)
Blowfish
SHA
MD5
ECC
RC4
RSA
SHA
MD5
Explanation: SHA and MD5 use use complex mathematical algorithms to compute hash values.
What service determines which resources a user can access along with the operations that a user can perform?
authentication
biometric
authorization
accounting
token
authorization
Explanation: Authorization determines whether a user has certain access privileges.
What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
authentication
confidentiality
nonrepudiation
privacy
integrity
privacy
Explanation: Privacy laws control appropriate use of data and access to data.
What three design principles help to ensure high availability? (Choose three.)
detect failures as they occur
eliminate single points of failure
check for data consistency
use encryption
provide for reliable crossover
ensure confidentiality
detect failures as they occur
eliminate single points of failure
provide for reliable crossover
Explanation: High availability systems typically include these three design principles.
For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
where you are
something you are
something you know
something you do
something you have
something you are
something you know
something you have
Explanation: The forms of authentication are something you know, have , or are.
What two methods help to ensure system availability? (Choose two.)
integrity checking
system backups
up-to-date operating systems
system resiliency
fire extinguishers
equipment maintenance
up-to-date operating systems
equipment maintenance
What name is given to a storage device connected to a network?
NAS
SAN
RAID
Cloud
DAS
NASExplanation: NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.
What are two methods that ensure confidentiality? (Choose two.)
authorization
availability
nonrepudiation
authentication
integrity
encryption
authentication
encryption
Explanation: Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.
What is a secure virtual network called that uses the public network?
MPLS
IDS
Firewall
NAC
IPS
VPN
VPN
Explanation: The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.
What mechanism can organizations use to prevent accidental changes by authorized users?
SHA-1
backups
version control
hashing
encryption
version control
Explanation: Version control ensures that two users cannot update the same object.