1. A cybersecurity specialist is asked to
identify the potential criminals known to
attack the organization. Which type of
hackers would the
... [Show More] cybersecurity specialist
be least concerned with?
black hat hackers
gray hat hackers
script kiddies
white hat hackers
Explanation:
Hackers are classified by colors to help define the
purpose of their break-in activities.
2. Which statement best describes a
motivation of hacktivists?
They are trying to show off their hacking skills.
They are interested in discovering new exploits.
They are curious and learning hacking skills.
They are part of a protest group behind a political
cause.
Explanation:
Each type of cybercriminal has a distinct motivation for
his or her actions.
3. What is an example of early warning
systems that can be used to thwart
cybercriminals?
Infragard
ISO/IEC 27000 program
Honeynet project
CVE database
Explanation:
Early warning systems help identify attacks and can be
used by cybersecurity specialists to protect systems.
4. Which technology should be used to
enforce the security policy that a
computing device must be checked against
the latest antivirus update before the
device is allowed to connect to the campus
network?
SAN
VPN
NAC
NAS
Explanation:
A cybersecurity specialist must be aware of the
technologies available to enforce its organization’s
security policy.
5. Which data state is maintained in NAS and
SAN services?
stored data
data in-transit
encrypted data
data in-process
Explanation:
A cybersecurity specialist must be familiar with the
types of technologies used to store, transmit, and
process data.
6. What are three states of data during which
data is vulnerable? (Choose three.)
purged data
stored data
data in-process
data encrypted
data decrypted
data in-transit
Explanation:
A cybersecurity specialist must be aware of each of the
three states of data to effectively protect data and
information. Purged data was stored data. Encrypted
and decrypted data can be in any of the three states.
7. Which technology can be used to ensure
data confidentiality?
hashing
identity management
encryption
RAID
Explanation:
A cybersecurity specialist must be aware of the
technologies available which support the CIA triad [Show Less]