click below
click below
Normal Size Small Size show me how
IT0201 - FA1
Cybersecurity Essentials
| Question | Answer |
|---|---|
| What is the main aim of a Cyber Security Incident Response Team (CSIRT)? | To help ensure organization, system and data preservation by performing investigations into computer security incidents |
| What protocol is used to collect information about traffic traversing a network? | NetFlow |
| What motivates a white-hat attacker? | Improving cybersecurity |
| Does having no social media and only browsing the Internet mean no online identity exists? | No |
| Which of the following tools can be used to provide a list of open ports on network devices? | Nmap |
| What characterizes cyberwarfare? | Internet-based conflict targeting other nations' information systems |
| The risk management process consists of four steps. Can you put these in the right order? | 1. Frame the Risk 2. Assess the Risk 3. Respond to the Risk 4. Monitor the Risk |
| Which of the following examples effectively illustrates how malware can be cleverly concealed? | An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware |
| Which of the following is a requirement of a strong password? | Use special characters such as ! @ or $ |
| Which configuration on a wireless router is not considered to be adequate security for a wireless network? | Preventing the broadcast of an SSID |
| What type of attack overwhelms a target's resources using multiple systems, rendering it inaccessible? | DDoS |
| What is an example of an Internet data domain? | |
| What type of attack overwhelms a computer's resources, crippling it through excessive memory usage or CPU strain? | algorithm |
| What does IoE stand for? | Internet of Everything |
| What does BYOD stand for? | bring your own device |
| Which three types of sensitive records are most attractive to cyber criminals? | medical, employment, education |
| What term describes an inexperienced or novice hacker? | script kiddie |
| What Workforce Framework category involves analyzing and assessing cybersecurity data to determine its intelligence value? | Analyze |
| Individuals who engage in unauthorized digital intrusions motivated by ideological or social convictions are colloquially termed _________ | hactivist |
| What is the definition of vulnerability? | a susceptibility or flaw that exposes a target to potential exploitation or attack. |