1.The U.S. government agency responsible for protecting our Nation's critical infrastructure from physical and cyber threats.
a) Federal Emergency Mangement Agency (FEMA)
Correct!
b) Department of Homeland Security (DHS)
c) Customs and Border Protection (CBP)
d) Computer Information System (CIS)
Question 2
1 / 1 pts
2. To protect our government and private sector cyber systems in 2009 the _______________was created under the Department of Homeland Security.
2. To protect our government and private sector cyber systems in 2009 the _______________was created under the Department of Homeland Security.
Correct!
a) National Cyber security and Communications Integration Center (NCCIC)
b) Federal Emergency Management Agency (FEMA)
c) Department of Homeland Security (DHS)
d) Customs and Border Protection (CBP)
Question 3
1 / 1 pts
Skip to question text.
3. The ___________ works with law enforcement agencies and the intelligence community by coordinating efforts among Federal, state, local, and tribal governments and control systems owners, operators, and vendors to protect this country critical infrastructure sectors from any cyber-attack
a) National Coordinating Center for Telecommunications (NCC)
Correct!
b) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT))
c) United States Computer Emergency Readiness Team (US-CERT)
d) NCCIC Operations & Integration (NOI)
Question 4
1 / 1 pts
4. The _________consists of 6 supporting branches (Threat Analysis & Information Sharing, Digital Analytics, Operations, Communications, International Operations) in order to meet its mission
4. The _________consists of 6 supporting branches (Threat Analysis & Information Sharing, Digital Analytics, Operations, Communications, International Operations) in order to meet its mission
a) National Coordinating Center for Telecommunications (NCC)
b) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
Correct!
c) United States Computer Emergency Readiness Team (US-CERT))
d) NCCIC Operations & Integration (NOI)
Question 5
1 / 1 pts
5. Due to the lack of cybersecurity professionals in the United States the National Initiative for Cybersecurity Education (NICE) created the _________in 2012
5. Due to the lack of cybersecurity professionals in the United States the National Initiative for Cybersecurity Education (NICE) created the _________in 2012
Correct!
a) National Cybersecurity Workforce Framework
b) Cyber Emergency Response Team
c) Nations cyber academic
d) National Security Agency
Question 6
1 / 1 pts
Skip to question text.
6. A __________ analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community, synthesizes and places intelligence information in context; draws insights about the possible implications
a) Computer Network Defense
Correct!
b) All Source Intelligence
c) Collection Operations
d) Computer Network Defense Infrastructure Support
Question 7
1 / 1 pts
7. _______________ refers to the preventative methods we use to protect information from being stolen, com-promised or attacked in any way
7. _______________ refers to the preventative methods we use to protect information from being stolen, com-promised or attacked in any way
a) System Requirements Planning
b) System Development
c) Threat Analysis
Correct!
d) Cybersecurity
Question 8
1 / 1 pts
8. ____________ this certification covers 10 domains that include cryptography and access control
8. ____________ this certification covers 10 domains that include cryptography and access control
a) CompTIASecurity+
Correct!
b) Certified Information Systems Security Professional (CISSP)
c) Certified Information Security Manager (CISM)
d) Cisco Certified Network Professional+Security (CCNP+S)
Question 9
1 / 1 pts
9. _____________ refers to the protection measures to safeguard information transmitted on the Internet from source to destination
9. _____________ refers to the protection measures to safeguard information transmitted on the Internet from source to destination
a) Application Programming
b) Cloud Computing
Correct!
c) Network Security
d) Systems Design
Question 10
1 / 1 pts
10. A ___________is a security breach facilitated by someone who is part of the organization
10. A ___________is a security breach facilitated by someone who is part of the organization
Correct!
a) Insider attack
b) Botnet
c) Advanced persistent threat
d) Social engineering
Question 11
1 / 1 pts
11. In a/an___________, the key is to maintain access without discovery; the intruder must continuously rewrite code and employ sophisticated evasion techniques
11. In a/an___________, the key is to maintain access without discovery; the intruder must continuously rewrite code and employ sophisticated evasion techniques
a) Insider attack
b) Botnet
c) Social engineering
Correct!
d) Advanced persistent threat (APT)
Question 12
1 / 1 pts
12. ___________ processes over 3 billion searches daily and over 90 percent of all Internet traffic runs through it
12. ___________ processes over 3 billion searches daily and over 90 percent of all Internet traffic runs through it
a) Yahoo
b) Facebook
Correct!
c) Google
d) Twitter
Question 13
1 / 1 pts
13. What field collects, preserves, analyzes, and presents computer evidence (electronic evidence) to a judge or attorney to help them prove if a crime was committed?
13. What field collects, preserves, analyzes, and presents computer evidence (electronic evidence) to a judge or attorney to help them prove if a crime was committed?
Correct!
a) Computer Forensics
b) Incident Handling
c) Penetration Testing
d) Intelligence Analysis
Question 14
1 / 1 pts
Skip to question text.
14. ___________refers to how cyber incident is handled by IT professionals or individuals in charge of the systems and software of an organization. Planning for an incident is critical because it helps a team react faster than they would if they would not be ready.
a) Computer Forensics
Correct!
b) Incident Handling
c) Penetration Testing
d) Intelligence Analisys
Question 15
1 / 1 pts
15. What will allow you to discover any system vulnerability that may not be known?
15. What will allow you to discover any system vulnerability that may not be known?
a) Computer test
b) Botnet test
Correct!
c) Penetration Test
d) Virus scan
Question 16
1 / 1 pts
Skip to question text.
16. In this career you will address problems, install, configure, troubleshoot, and provide maintenance and training in response to customer requirements or inquiries. You will also develop and conduct test of new systems to evaluate compliance with specifications and requirements
a) Computer Network Defense (CND)
b) All Source Intelligence
c) Collection Operations
Correct!
d) Customer Service and Technical Support
Question 17
1 / 1 pts
17. In this cyber security field you will analyze collected information to identify vulnerabilities and potential for exploitation
17. In this cyber security field you will analyze collected information to identify vulnerabilities and potential for exploitation
Correct!
a) Exploitation Analysis
b) Data Administration
c) Digital Forensics
d) Customer Service and Technical Support
Question 18
1 / 1 pts
18. The ____________certification covers the following five performance domains: Initiating the project, planning the project, executing the project, monitoring and controlling the project, and closing the project:
18. The ____________certification covers the following five performance domains: Initiating the project, planning the project, executing the project, monitoring and controlling the project, and closing the project:
a) CISM
b) CISSP
Correct!
c) PMP
d) CCNP+S
Question 19
1 / 1 pts
19. This certification is an entry-level certification that focuses on actual competencies at system administration, including installation and configuration of a Red Hat Linux system and attaching it to a live network running network services.
19. This certification is an entry-level certification that focuses on actual competencies at system administration, including installation and configuration of a Red Hat Linux system and attaching it to a live network running network services.
Correct!
a) RHCSA
b) CISSP
c) PMP
d) CCNP+S
Question 20
1 / 1 pts
20. This certification will help you build and recognize the skills and experience required to effectively design, operate, and evolve the cloud environment
20. This certification will help you build and recognize the skills and experience required to effectively design, operate, and evolve the cloud environment
a) RHCSA
b) PMP
c) CCNP+S
Correct!
d) VCP