Slam Dunk -- Episode 42

Slam Dunk -- Episode 43

Slam Dunk -- Episode 44

Slam Dunk -- Episode 45

Slam Dunk -- Episode 46

Magic Knight Rayearth Episode 1
Slam Dunk -- Episode 47

Slam Dunk -- Episode 47

Diamond no Ace episode 18
1.The U.S. government agency responsible for protecting our Nation's critical infrastructure from physical and cyber threats. a) Federal Emergency Mangement Agency (FEMA) Correct! b) Department of Homeland Security (DHS) c) Customs and Border Protection (CBP) d) Computer Information System (CIS) Question 2 1 / 1 pts

2. To protect our government and private sector cyber systems in 2009 the _______________was created under the Department of Homeland Security.

2. To protect our government and private sector cyber systems in 2009 the _______________was created under the Department of Homeland Security. Correct! a) National Cyber security and Communications Integration Center (NCCIC) b) Federal Emergency Management Agency (FEMA) c) Department of Homeland Security (DHS) d) Customs and Border Protection (CBP) Question 3 1 / 1 pts Skip to question text. 3. The ___________ works with law enforcement agencies and the intelligence community by coordinating efforts among Federal, state, local, and tribal governments and control systems owners, operators, and vendors to protect this country critical infrastructure sectors from any cyber-attack a) National Coordinating Center for Telecommunications (NCC) Correct! b) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)) c) United States Computer Emergency Readiness Team (US-CERT) d) NCCIC Operations & Integration (NOI) Question 4 1 / 1 pts

4. The _________consists of 6 supporting branches (Threat Analysis & Information Sharing, Digital Analytics, Operations, Communications, International Operations) in order to meet its mission

4. The _________consists of 6 supporting branches (Threat Analysis & Information Sharing, Digital Analytics, Operations, Communications, International Operations) in order to meet its mission a) National Coordinating Center for Telecommunications (NCC) b) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Correct! c) United States Computer Emergency Readiness Team (US-CERT)) d) NCCIC Operations & Integration (NOI) Question 5 1 / 1 pts

5. Due to the lack of cybersecurity professionals in the United States the National Initiative for Cybersecurity Education (NICE) created the _________in 2012

5. Due to the lack of cybersecurity professionals in the United States the National Initiative for Cybersecurity Education (NICE) created the _________in 2012 Correct! a) National Cybersecurity Workforce Framework b) Cyber Emergency Response Team c) Nations cyber academic d) National Security Agency Question 6 1 / 1 pts Skip to question text. 6. A __________ analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community, synthesizes and places intelligence information in context; draws insights about the possible implications a) Computer Network Defense Correct! b) All Source Intelligence c) Collection Operations d) Computer Network Defense Infrastructure Support Question 7 1 / 1 pts

7. _______________ refers to the preventative methods we use to protect information from being stolen, com-promised or attacked in any way

7. _______________ refers to the preventative methods we use to protect information from being stolen, com-promised or attacked in any way a) System Requirements Planning b) System Development c) Threat Analysis Correct! d) Cybersecurity Question 8 1 / 1 pts

8. ____________ this certification covers 10 domains that include cryptography and access control

8. ____________ this certification covers 10 domains that include cryptography and access control a) CompTIASecurity+ Correct! b) Certified Information Systems Security Professional (CISSP) c) Certified Information Security Manager (CISM) d) Cisco Certified Network Professional+Security (CCNP+S) Question 9 1 / 1 pts

9. _____________ refers to the protection measures to safeguard information transmitted on the Internet from source to destination

9. _____________ refers to the protection measures to safeguard information transmitted on the Internet from source to destination a) Application Programming b) Cloud Computing Correct! c) Network Security d) Systems Design Question 10 1 / 1 pts

10. A ___________is a security breach facilitated by someone who is part of the organization

10. A ___________is a security breach facilitated by someone who is part of the organization Correct! a) Insider attack b) Botnet c) Advanced persistent threat d) Social engineering Question 11 1 / 1 pts

11. In a/an___________, the key is to maintain access without discovery; the intruder must continuously rewrite code and employ sophisticated evasion techniques

11. In a/an___________, the key is to maintain access without discovery; the intruder must continuously rewrite code and employ sophisticated evasion techniques a) Insider attack b) Botnet c) Social engineering Correct! d) Advanced persistent threat (APT) Question 12 1 / 1 pts

12. ___________ processes over 3 billion searches daily and over 90 percent of all Internet traffic runs through it

12. ___________ processes over 3 billion searches daily and over 90 percent of all Internet traffic runs through it a) Yahoo b) Facebook Correct! c) Google d) Twitter Question 13 1 / 1 pts

13. What field collects, preserves, analyzes, and presents computer evidence (electronic evidence) to a judge or attorney to help them prove if a crime was committed?

13. What field collects, preserves, analyzes, and presents computer evidence (electronic evidence) to a judge or attorney to help them prove if a crime was committed? Correct! a) Computer Forensics b) Incident Handling c) Penetration Testing d) Intelligence Analysis Question 14 1 / 1 pts Skip to question text. 14. ___________refers to how cyber incident is handled by IT professionals or individuals in charge of the systems and software of an organization. Planning for an incident is critical because it helps a team react faster than they would if they would not be ready. a) Computer Forensics Correct! b) Incident Handling c) Penetration Testing d) Intelligence Analisys Question 15 1 / 1 pts

15. What will allow you to discover any system vulnerability that may not be known?

15. What will allow you to discover any system vulnerability that may not be known? a) Computer test b) Botnet test Correct! c) Penetration Test d) Virus scan Question 16 1 / 1 pts Skip to question text. 16. In this career you will address problems, install, configure, troubleshoot, and provide maintenance and training in response to customer requirements or inquiries. You will also develop and conduct test of new systems to evaluate compliance with specifications and requirements a) Computer Network Defense (CND) b) All Source Intelligence c) Collection Operations Correct! d) Customer Service and Technical Support Question 17 1 / 1 pts

17. In this cyber security field you will analyze collected information to identify vulnerabilities and potential for exploitation

17. In this cyber security field you will analyze collected information to identify vulnerabilities and potential for exploitation Correct! a) Exploitation Analysis b) Data Administration c) Digital Forensics d) Customer Service and Technical Support Question 18 1 / 1 pts

18. The ____________certification covers the following five performance domains: Initiating the project, planning the project, executing the project, monitoring and controlling the project, and closing the project:

18. The ____________certification covers the following five performance domains: Initiating the project, planning the project, executing the project, monitoring and controlling the project, and closing the project: a) CISM b) CISSP Correct! c) PMP d) CCNP+S Question 19 1 / 1 pts

19. This certification is an entry-level certification that focuses on actual competencies at system administration, including installation and configuration of a Red Hat Linux system and attaching it to a live network running network services.

19. This certification is an entry-level certification that focuses on actual competencies at system administration, including installation and configuration of a Red Hat Linux system and attaching it to a live network running network services. Correct! a) RHCSA b) CISSP c) PMP d) CCNP+S Question 20 1 / 1 pts

20. This certification will help you build and recognize the skills and experience required to effectively design, operate, and evolve the cloud environment

20. This certification will help you build and recognize the skills and experience required to effectively design, operate, and evolve the cloud environment a) RHCSA b) PMP c) CCNP+S Correct! d) VCP
Slam Dunk -- Episode 48

Slam Dunk -- Episode 49