This version of IP has 128-bit address.
IPv6
or '1'='1 is an example of this kind of attack.
SQL Inection
This is the term that means “thinking about thinking”.
Metacognition
A step-by-step document that is used for operations
Procedure
This is a brief 30-90-second introduction of yourself.
Elevator Pitch
What field of a packet header indicates IPv4 or IPv6?
this type of attack is used to steal information from Bluetooth activated devices.
Bluesnarfing
What is the term for the “ability to recruit cognitive, motivational, and emotional resources to achieve long-term goals”?
Self-regulation
This policy is intended to address specific needs within an organization
Issue-specific Policy
A user being assigned to a group that has authorization to perform functions on certain data is an example of what kind of control?
Role-Based Access control (RBAC)
Which IP version provides support for encryption?
IPv6
During this type of attack the hacker eavesdrops on data sent back and forth between two people, networks or computers.
Man-in-the-Middle (MITM)
“Money, location, benefits, job satisfaction, promotion opportunities” are examples of?
examples of job offer priorities
a high-level policy that sets the overall tone of an organizations security approach.
Program Policy
What security risk currently sits as #5 on the OWASP top ten?
What field in a packet header limits the number of hops a packet is allowed to take before it reaches it's destination?
Time-to-Live (TTL)
This attack uses security gaps in the DNS protocol to redirect internet traffic to malicious websites.
DNS poisoning (also known as DNS Cache Poisoning or DNS Spoofing)
It has been said that “prolonged stress, extended adversity, intense/protracted worry, chronic insomnia or other health condition, not knowing your strengths, and the habit of hiding behind others” are examples of?
“factors that can disrupt self-regulation”
Issue-specific policy
Something you have, something you are, and something you know are forms of this.
Multi-factor Authentication (MFA)
What ICMPv6 Type/code error indicates port unreachable?
Type 1 code 4
This type of attack takes control of the hypervisor.
Hyperjacking
This process is comprised of the following: Forethought phase, Performance phase, Self-reflection phase
phases of the self-regulation process
This policy compels the safeguarding of information while it eliminates, or at least reduces, personal liability for employees
Security policy
Personal Effectiveness Competencies and Workplace Competencies are two soft-skill related tiers that are part of this model.
NICE Cyber Security Competency Model