This is a person who breaks into a computer system for politically or socially motivated purposes.
What is a Hacktivist?
Protection of networked systems and data
What is Cybersecurity?
This tool is used to lure an attacker to analyze the behavior of the attack.
What is Honeypot?
What is spyware?
These programs track where you go on the Internet and what you type into your keyboard.
What is Spyware?
This is the threat presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is an Insider Threat?
The term that ensures data is accessed only by authorized individuals
What is Confidentiality
Creating an alert and logging the detection is an action of this device.
What is IDS? (Intrusion Detection System)
Security implementation of biometrics authentication. (List two)
What are Fingerprint, Palm print, voice and facial recognition?
Malware can self-replicate (can download automatically), but only this malware requires you to do something, such as click on an email link, to actually activate it.
What is a virus?
This is the official name of the Cybersecurity Certification Exam you will take in May.
What is CompTia Security+?
This leg of the cybersecurity triad could be met adding a couple web servers for balancing and redundancy.
What is Availability?
The main purpose of this tool is to perform port scanning for open ports.
What is Nmap?
Logging into Zoom using the "sign in using Google" link is an example of this.
What is Open Authorization?
This type of malware may masquerade as legitimate software but contains malicious instructions that may harm your computer.
What is a Trojan?
The weakest link in Cybersecurity.
What are Human Beings?
This component of the cybersecurity triad confirms data is unaltered during transit and unchanged
What is Integrity?
Malware is a portmanteau of these two words.
What is Malicious Software?
This leg of the cybersecurity triad is violated when medical offices send patient records through an email, putting them at risk.
What is confidentiality?
This is a type of attack that uses zombies.
What is DDos?
The recommended approach to protecting the data on these items is an isolated network
What are IOT Devices? Internet of Things
The main purpose of this internet-based conflict involving the networks and computer systems of other nations is to gain advantage over adversaries.
What is Cyberwarfare?
The goal for this team is to ensure company, system, and data preservation through timely investigations into security incidents.
What is CSIRT? (Computer Security Incident Response Team)
These two tools can be used to detect anomalous behavior, command and control traffic, and infected hosts.
What are IDS (intrusion detection system) and NetFLow logging?
This stage of the kill chain focuses on the identification and selection of targets.
What is Reconnaissance?