This is used to compare current network activity to a threat database.
What is an Intrusion Detection System(IDS)?
What is lower cost because of few devices?
These are rules created by someone in authority that must be followed by all employees.
What are regulations?
This can happen with a false positive notification from a Network IDS.
What is it can blind the response team from seeing actual attacks?
A NIDS uses passive hardware to look for this on a network.
What is malicious activity?
This is when a cybercriminal gets public information on a target.
What is open source intelligence?
Reason why someone would want to become an entrepreneur.
What is to be your own boss or
use your creative talents or
set your own hours/schedule/rules?
This type of software exploitation happens because of a flaw that has not had a patch created to fix it yet.
What is zero-day attack?
This set of tools is used to prevent critical data exfiltration.
What is a DLP - Data Loss Prevention?
This basic network design principle states that the confidentiality of a system remains intact when availability is interrupted.
What is a failsafe default?
(functional at all times)
You would use this type of resume if you have work experience and NO gaps in employment.
What is chronological resume?
NMAP is a scanning tool that allows an administrator to find this on their network.
What are devices running on the network?
This scanning tool can detect the presence of a host on a specific IP address
What is ping?
This exploit happens when an attacker runs code on a VM to allow the OS to break out and interact with the hypervisor.
What is VM escaping?
This agency is responsible for creating and monitoring safe work environments.
What is OSHA?
This type of network uses encryption and is accessed by only authorized users and allows employees to work remotely.
What is virtual private network?
What are the sensors?
This soft skills involves being able to evaluated evidence with an open mind.
What is critical thinking?
This type of resume is best if you have little or no employment experience but can still highlight skills.
What is functional resume?
This type of social engineering usually appears urgent and the attacks pretends to be someone from your work possibly from HR or IT and they are trying to get your username and password.
What is pretexting?