FedVTE ENTERPRISE CYBERSECURITY OPERATIONS LATEST
QUESTIONS AND CORRECT ANSWERS
Anti-malware - ANSWER: Antimalware is a type of software program created to
protect information technology (IT) systems and individual computers from
malicious software, or malware. Antimalware programs scan a computer system to
prevent, detect and remove malware.
Antivirus - ANSWER: Software designed to detect and destroy computer viruses.
Back up recovery - ANSWER: Backup and recovery is the process of duplicating data
and storing it in a secure place in case of loss or damage, and then restoring that
data to a location.
Botnets - ANSWER: A network of private computers infected with malicious software
and controlled as a group without the owners' knowledge, for example to send
spam.
Bots - ANSWER: An autonomous program on the internet or another network that
can interact with systems or users.
Cybercrime - ANSWER: Criminal activities carried out by means of computers or the
internet.
Cybersecurity strategy - ANSWER: A cybersecurity strategy is an action plan detailing
how a business will protect itself from cyber threats. An effective cybersecurity
strategy provides a blueprint on what to prioritize in order to have a safe and secure
cyber environment.
Disaster recovery - ANSWER: Disaster recovery is an organization's plan to protect its
IT systems and data from disasters and recover quickly to minimize downtime and
losses.
Encryption - ANSWER: The process of converting information or data into a code,
especially to prevent unauthorized access.
Firewall - ANSWER: A firewall is a network security device that monitors and filters
incoming and outgoing network traffic based on an organization's previously
established security policies. At its most basic, a firewall is essentially the barrier that
sits between a private internal network and the public internet.
Hacking - ANSWER: The gaining of unauthorized access to data in a system or
computer.
, Identity theft - ANSWER: The fraudulent practice of using another person's name and
personal information in order to obtain credit, loans and so on.
Multi-factor Authentication - ANSWER: Multi-factor Authentication (MFA) is an
authentication method that requires the user to provide 2 or more verification
factors to gain access to a resource such as an application or online account.
Phishing - ANSWER: The fraudulent practice of sending emails or other messages
purporting to be from reputable companies in order to induce individuals to reveal
personal information, such as passwords and credit card numbers.
Privacy - ANSWER: A state in which one is not observed or disturbed by other
people.
Risk matrix - ANSWER: A matrix used during risk assessment to define the level of
risk by considering the category of probability or likelihood against the category of
consequence severity.
Security vulnerability - ANSWER: A weakness, flaw, or error found within a security
system that has the potential to be leveraged by a threat actor to compromise a
secure network.
Smishing - ANSWER: The fraudulent practice of sending text messages purporting to
be from reputable companies to induce individuals to reveal personal information
like passwords or credit card numbers.
Threat actor - ANSWER: An individual or group that poses a security threat to an
individual or organization.
Threat landscape - ANSWER: The big picture of potential risks and dangers people
may face online, including various cybersecurity risks that can harm individuals,
organizations, or enterprises.
Assess - ANSWER: Make a judgment of value, quality, outcomes, results, or size.
Describe - ANSWER: Provide characteristics and features.
Explain - ANSWER: Relate cause and effect; make the relationships between things
evident; provide why and/or how.
Identify - ANSWER: Recognize and name.
Investigate - ANSWER: Plan, inquire into, and draw conclusions about.
Account access - ANSWER: A critical security vulnerability in social networking that
can lead to unauthorized access to personal profiles, potentially resulting in identity
theft, privacy breaches, and financial harm for individuals and enterprises.
QUESTIONS AND CORRECT ANSWERS
Anti-malware - ANSWER: Antimalware is a type of software program created to
protect information technology (IT) systems and individual computers from
malicious software, or malware. Antimalware programs scan a computer system to
prevent, detect and remove malware.
Antivirus - ANSWER: Software designed to detect and destroy computer viruses.
Back up recovery - ANSWER: Backup and recovery is the process of duplicating data
and storing it in a secure place in case of loss or damage, and then restoring that
data to a location.
Botnets - ANSWER: A network of private computers infected with malicious software
and controlled as a group without the owners' knowledge, for example to send
spam.
Bots - ANSWER: An autonomous program on the internet or another network that
can interact with systems or users.
Cybercrime - ANSWER: Criminal activities carried out by means of computers or the
internet.
Cybersecurity strategy - ANSWER: A cybersecurity strategy is an action plan detailing
how a business will protect itself from cyber threats. An effective cybersecurity
strategy provides a blueprint on what to prioritize in order to have a safe and secure
cyber environment.
Disaster recovery - ANSWER: Disaster recovery is an organization's plan to protect its
IT systems and data from disasters and recover quickly to minimize downtime and
losses.
Encryption - ANSWER: The process of converting information or data into a code,
especially to prevent unauthorized access.
Firewall - ANSWER: A firewall is a network security device that monitors and filters
incoming and outgoing network traffic based on an organization's previously
established security policies. At its most basic, a firewall is essentially the barrier that
sits between a private internal network and the public internet.
Hacking - ANSWER: The gaining of unauthorized access to data in a system or
computer.
, Identity theft - ANSWER: The fraudulent practice of using another person's name and
personal information in order to obtain credit, loans and so on.
Multi-factor Authentication - ANSWER: Multi-factor Authentication (MFA) is an
authentication method that requires the user to provide 2 or more verification
factors to gain access to a resource such as an application or online account.
Phishing - ANSWER: The fraudulent practice of sending emails or other messages
purporting to be from reputable companies in order to induce individuals to reveal
personal information, such as passwords and credit card numbers.
Privacy - ANSWER: A state in which one is not observed or disturbed by other
people.
Risk matrix - ANSWER: A matrix used during risk assessment to define the level of
risk by considering the category of probability or likelihood against the category of
consequence severity.
Security vulnerability - ANSWER: A weakness, flaw, or error found within a security
system that has the potential to be leveraged by a threat actor to compromise a
secure network.
Smishing - ANSWER: The fraudulent practice of sending text messages purporting to
be from reputable companies to induce individuals to reveal personal information
like passwords or credit card numbers.
Threat actor - ANSWER: An individual or group that poses a security threat to an
individual or organization.
Threat landscape - ANSWER: The big picture of potential risks and dangers people
may face online, including various cybersecurity risks that can harm individuals,
organizations, or enterprises.
Assess - ANSWER: Make a judgment of value, quality, outcomes, results, or size.
Describe - ANSWER: Provide characteristics and features.
Explain - ANSWER: Relate cause and effect; make the relationships between things
evident; provide why and/or how.
Identify - ANSWER: Recognize and name.
Investigate - ANSWER: Plan, inquire into, and draw conclusions about.
Account access - ANSWER: A critical security vulnerability in social networking that
can lead to unauthorized access to personal profiles, potentially resulting in identity
theft, privacy breaches, and financial harm for individuals and enterprises.