This is a person who breaks into a computer system for politically or socially motivated purposes.
What is a Hacktivist?
Protection of networked systems and data
What is Cybersecurity?
This tool is used to lure an attacker to analyze the behavior of the attack.
What is Honeypot?
Downloading software only from trusted websites is the best method to avoid getting this.
What is malware or spyware or viruses?
These programs track where you go on the Internet and what you type into your keyboard.
What is Spyware?
This is the threat presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is an Insider Threat?
The term that ensures data is accessed only by authorized individuals
What is Confidentiality
Creating an alert and logging the detection is an action of this device.
What is IDS? (Intrusion Detection System)
Security implementation of biometrics authentication. (List two)
What are Fingerprint, Palm print, voice and facial recognition?
Malware can self-replicate (can download automatically), but only this malware requires you to do something, such as click on an email link, to actually activate it.
What is a virus?
This is one of the Certification Exams offered through TestOut.
What is CompTia Security+ or CompTIA Network, or CompTIA A+,
This leg of the cybersecurity triad could be met by adding more host devices and web servers for access and redundancy.
What is Availability?
The main purpose of this tool is to perform port scanning for open ports.
What is Nmap or Netcat?
Logging into Zoom using the "sign in using Google" link is an example of this.
What is Open Authorization?
This type of malware may masquerade as legitimate software but contains malicious instructions that may harm your computer.
What is a Trojan?
The weakest link in Cybersecurity.
What are Human Beings?
This component of the cybersecurity triad confirms data is unaltered during transit and unchanged
What is Integrity?
Malware is a portmanteau of these two words.
What is Malicious Software?
This leg of the cybersecurity triad is violated when medical offices send patient records through an email.
What is confidentiality?
This is a type of attack that uses other zombie computers.
What is DDos? (or DoS)
All the new devices being hooked to the internet (cameras, thermostats, cars, etc) are known as....
What are IOT Devices? Internet of Things
The main purpose of this internet-based conflict involving the networks and computer systems of other nations is to gain advantage over adversaries.
What is Cyberwarfare?
The goal for this team is to ensure company, system, and data preservation through timely investigations into security incidents.
What is Computer Security Incident Response Team?
These two tools can be used to detect anomalous behavior, command and control traffic, and infected hosts.
What are intrusion detection system and network traffic logging?
Someone who hacks to find and report vulnerabilities.
What is a White Hat hacker?