100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Chapter 1 Introduction to Cybersecurity Questions Graded A+

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
17-09-2024
Written in
2024/2025

Chapter 1 Introduction to Cybersecurity Questions Graded A+ attack vector avenue or path a hacker uses to commit the attack black-hat hacker operates outside the law (bad) cyberattack attempts to steal, damage or destroy data or computer system cybersecurity process of protecting a system against unintended or malicious changes or use darknet - part of the internet that is not easily accessible to the average user - represents the underground of the internet deepweb includes resources not found within a typical search engine gray-hat hacker does no harm, but doesn't ask for permission (neutral) hacking act of circumventing or breaking past security boundaries hacktivism - aim is to target and harm companies or individuals with whom they have a fundamental disagreement - hacking in an effort to convey a social or political message onion network - connection involves data being rerouted through many computers before you are delivered to your destination - a technique for anonymous communication over a computer network phreaking hacking into a phone system script kiddie slang term used to describe an individual who uses premade tools to perform their attacks tor browser - gives access to the anonymous websites on the darknet - stands for "The Onion Router" browser virus malicious software code that is unleashed and attempts to perform its destructive content white-hat hacker ethical and law-abiding (good) worm standalone malware computer program that replicates itself in order to spread to other computers application cell each individual machine container each individual machine host operating system operating system located on the physical machine hyper -v virtualization platform developed by microsoft for its servers and desktops hypervisor specific software that handles the responsibilities of running a virtual machine provisioning ability to quickly deploy resources when needed sandbox isolated place to test and deploy applications and configurations snapshot saved version of the system in its current state type 1 hypervisor does not interface with the host operating system type 2 hypervisor runs on the host operating system virtual box open source virtualization platform from oracle virtual machine (VM) - looks and functions like an actual computer system - separated from the operating system running on the machine virtual machine escape malicious code is run on the VM that allows the guest operating system to break out of its environment and interact directly with the hypervisor virtual machine monitor (VMM) specific software that handles the responsibilities of running a virtual machine virtual machine (VM) sprawl occurs with the continuous deployment of virtual machines and is a drain on the system resources VM Ware line of virtualization products that includes the desktop workstation and player versions Certified Information Systems Security Professional (CISSP) professional certification for those with strong managerial background and technical expertise CompTIA Advanced Security Practitioner (CASP) focuses on critical thinking, incident response, risk management, and technical integration throughout business CompTIA Cybersecurity Analyst (CySA+) focuses on skills to assess combat, and prevent security threats CompTIA Security+ entry-level certification for computer security soft skills skills necessary to communicate and work with others ex. collaboration, leadership, reliability, etc. 1.1 What is an attack surface? The different attack vectors an attacker can use to enter or extract data from an environment. 1.1 A hacker that uses premade tools to conduct attacks is known as which type of hacker? This type of hacker is a "script kiddie." 1.1 When you want to remain anonymous on the Internet, what manages the traffic flow? A tor browser/onion network manages the traffic flow. 1.1 A hacker motivated by personal beliefs is practicing what type of hacking? They are practicing hacktivism. 1.1 What is the team called that is hired or used to assess the security of a company? Red teams, another name for Pen Testers 1.2 What is the name of the software that controls the communication between the VM and the physical host? Hypervisor/Virtual Machine Monitor 1.2 A native or bare metal hypervisor does not communicate with which element(s) of the physical host? The host operating system. 1.2 What is the name of Microsoft's software implementation of a hypervisor? Hyper -V 1.2 Briefly describe VM sprawl. Overload of system components. Ex. too much ram or cpu usage. 1.2 To create an image of a VM in its current state, what would you do? Take a Snapshot 1.3 Skills that are necessary for communication are called: Soft skills 1.3 Which organization provides certifications such as Security+ and CSA+? CompTIA

Show more Read less
Institution
Cyber Security
Module
Cyber security








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber security
Module
Cyber security

Document information

Uploaded on
September 17, 2024
Number of pages
4
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Chapter 1 Introduction to Cybersecurity
Questions Graded A+

attack vector - answer avenue or path a hacker uses to commit the attack

black-hat hacker - answer operates outside the law (bad)

cyberattack - answer attempts to steal, damage or destroy data or computer system

cybersecurity - answer process of protecting a system against unintended or malicious
changes or use

darknet - answer- part of the internet that is not easily accessible to the average user
- represents the underground of the internet

deepweb - answer includes resources not found within a typical search engine

gray-hat hacker - answer does no harm, but doesn't ask for permission (neutral)

hacking - answeract of circumventing or breaking past security boundaries

hacktivism - answer- aim is to target and harm companies or individuals with whom they
have a fundamental disagreement
- hacking in an effort to convey a social or political message

onion network - answer- connection involves data being rerouted through many
computers before you are delivered to your destination
- a technique for anonymous communication over a computer network

phreaking - answerhacking into a phone system

script kiddie - answerslang term used to describe an individual who uses premade tools
to perform their attacks

tor browser - answer- gives access to the anonymous websites on the darknet
- stands for "The Onion Router" browser

virus - answermalicious software code that is unleashed and attempts to perform its
destructive content

white-hat hacker - answerethical and law-abiding (good)
£11.16
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
julianah420 Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
652
Member since
2 year
Number of followers
323
Documents
33704
Last sold
1 day ago
NURSING,TESTBANKS,ASSIGNMENT,AQA AND ALL REVISION MATERIALS

On this page, you find all documents, package deals, and flashcards offered by seller julianah420

4.3

147 reviews

5
101
4
20
3
7
2
5
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions