Module 4
Module 5
Module 6
Random
100

This is used to compare current network activity to a threat database.

What is an Intrusion Detection System(IDS)?

100
This is an advantage of virtualization.

What is lower cost because of few devices?

100

These are rules created by someone in authority that must be followed by all employees.

What are regulations?

100

This can happen with a false positive notification from a Network IDS.

What is it can blind the response team from seeing actual attacks?

200

 A NIDS uses passive hardware to look for this on a network.

What is malicious activity?

200

This is when a cybercriminal gets public information on a target.

What is open source intelligence?

200

Reason why someone would want to become an entrepreneur.

What is to be your own boss or

use your creative talents or

set your own hours/schedule/rules?

200

This type of software exploitation happens because of a flaw that has not had a patch created to fix it yet.

What is zero-day attack?

300

This set of tools is used to prevent critical data exfiltration.

What is a DLP - Data Loss Prevention?

300

This basic network design principle states that the confidentiality of a system remains intact when availability is interrupted.

What is a failsafe default?

(functional at all times)

300

You would use this type of resume if you have work experience and NO gaps in employment.

What is chronological resume?

300

NMAP is a scanning tool that allows an administrator to find this on their network.

What are devices running on the network?

400

This scanning tool can detect the presence of a host on a specific IP address

What is ping?

400

This exploit happens when an attacker runs code on a VM to allow the OS to break out and interact with the hypervisor.

What is VM escaping?

400

This agency is responsible for creating and monitoring safe work environments.

What is OSHA?

400

This type of network uses encryption and is accessed by only authorized users and allows employees to work remotely.

What is virtual private network?

500
This component of an IDS is responsible for collecting and forwarding data.

What are the sensors?

500

This soft skills involves being able to evaluated evidence with an open mind.

What is critical thinking?

500

This type of resume is best if you have little or no employment experience but can still highlight skills.

What is functional resume?

500

This type of social engineering usually appears urgent and the attacks pretends to be someone from your work possibly from HR or IT and they are trying to get your username and password. 

What is pretexting?

M
e
n
u