Thompson12
On this page, you find all documents, package deals, and flashcards offered by seller Thompson12.
- 825
- 0
- 0
Community
- Followers
- Following
2 Reviews received
825 items
CompTIA CySA+ Best Score A.
A formal classification of the resources and expertise available to a threat actor. 
Agile model 
A software development model that focuses on iterative and incremental development 
to account for evolving requirements and expectations. 
AI 
(artificial intelligence) The science of creating machines with the ability to develop 
problem solving and analysis strategies without significant human direction or 
intervention. 
air gap 
A type of network isolation that physically separates a network fr...
- Exam (elaborations)
- • 30 pages •
A formal classification of the resources and expertise available to a threat actor. 
Agile model 
A software development model that focuses on iterative and incremental development 
to account for evolving requirements and expectations. 
AI 
(artificial intelligence) The science of creating machines with the ability to develop 
problem solving and analysis strategies without significant human direction or 
intervention. 
air gap 
A type of network isolation that physically separates a network fr...
CySA+ TOP CLASS.
Chief Information Security Officer (CISO) 
Typically the job title of the person with overall responsibility for information assurance 
and systems security. Sometimes called the CIO. 
Security Operations Center, SOC 
The location where security professionals monitor and protect critical information assets 
in an organization 
Security Control 
Something designed to give a particular asset or information system the properties of 
confidentiality, integrity, availability, and non-repudiation 
NIS...
- Exam (elaborations)
- • 131 pages •
Chief Information Security Officer (CISO) 
Typically the job title of the person with overall responsibility for information assurance 
and systems security. Sometimes called the CIO. 
Security Operations Center, SOC 
The location where security professionals monitor and protect critical information assets 
in an organization 
Security Control 
Something designed to give a particular asset or information system the properties of 
confidentiality, integrity, availability, and non-repudiation 
NIS...
CySA+. Top Quality Solution.
Operations team 
Red team 
After analyzing and correlating activity from multiple sensors, the security analyst has 
determined a group from a high-risk country is responsible for a sophisticated breach of 
the company network and continuous administration of targeted attacks for the past 
three months. Until now, the attacks went unnoticed. This is an example of: 
privilege escalation. 
advanced persistent threat. 
malicious insider threat. 
spear phishing. 
advanced persistent threat. 
A syste...
- Exam (elaborations)
- • 105 pages •
Operations team 
Red team 
After analyzing and correlating activity from multiple sensors, the security analyst has 
determined a group from a high-risk country is responsible for a sophisticated breach of 
the company network and continuous administration of targeted attacks for the past 
three months. Until now, the attacks went unnoticed. This is an example of: 
privilege escalation. 
advanced persistent threat. 
malicious insider threat. 
spear phishing. 
advanced persistent threat. 
A syste...
CySA+ Top Graded.
service? 
A. Manually log in to the service and upload data files on a regular basis. 
B. Have the internal development team script connectivity and file transfers to the new 
service. 
C. Create a dedicated SFTP site and schedule transfers to ensure file transport 
security. 
D. Utilize the cloud product's API for supported and ongoing integrations. 
D. Utilize the cloud product's API for supported and ongoing integrations 
Data spillage occurred when an employee accidentally emailed a sensit...
- Exam (elaborations)
- • 51 pages •
service? 
A. Manually log in to the service and upload data files on a regular basis. 
B. Have the internal development team script connectivity and file transfers to the new 
service. 
C. Create a dedicated SFTP site and schedule transfers to ensure file transport 
security. 
D. Utilize the cloud product's API for supported and ongoing integrations. 
D. Utilize the cloud product's API for supported and ongoing integrations 
Data spillage occurred when an employee accidentally emailed a sensit...
Venn diagram a diagram that shows relationships among sets of obejects Absolute value the distance of a number from zero on a number line Integer the set of whole numbers and their opposites Negative Integer an integer that is less than zero Opposites tw
Venn diagram 
a diagram that shows relationships among sets of obejects 
Absolute value 
the distance of a number from zero on a number line 
Integer 
the set of whole numbers and their opposites 
Negative Integer 
an integer that is less than zero 
Opposites 
two numbers that are the same distance from zero on a number line, but are in oposite 
directions. (-2 and 2) 
Posotive integer 
an integer that is greater than zero 
vRatio 
a comparison of two numbers, written as a fraction 
Rational num...
- Exam (elaborations)
- • 2 pages •
Venn diagram 
a diagram that shows relationships among sets of obejects 
Absolute value 
the distance of a number from zero on a number line 
Integer 
the set of whole numbers and their opposites 
Negative Integer 
an integer that is less than zero 
Opposites 
two numbers that are the same distance from zero on a number line, but are in oposite 
directions. (-2 and 2) 
Posotive integer 
an integer that is greater than zero 
vRatio 
a comparison of two numbers, written as a fraction 
Rational num...
WGU C182 Best Mark A.
It provides tax havens for companies. 
t allows companies to reach a wider customer base. 
It allows companies to reach a wider customer base 
Which category of computer has an external flat screen monitor, optical disk 
drive, and a large capacity hard drive? 
Handheld 
Laptop 
Desktop 
Mainframe 
Desktop 
Which two software application packages would be classified as productivity 
software? Choose 2 answers 
E-mail 
Word Processor 
Spreadsheet program 
FTP client 
Word processor and spreadshee...
- Exam (elaborations)
- • 15 pages •
It provides tax havens for companies. 
t allows companies to reach a wider customer base. 
It allows companies to reach a wider customer base 
Which category of computer has an external flat screen monitor, optical disk 
drive, and a large capacity hard drive? 
Handheld 
Laptop 
Desktop 
Mainframe 
Desktop 
Which two software application packages would be classified as productivity 
software? Choose 2 answers 
E-mail 
Word Processor 
Spreadsheet program 
FTP client 
Word processor and spreadshee...
WGU C182 Intro To IT Highly Rated.
As a new sales manager, Sylvia is studying the historical and current sales report 
numbers to determine the top three salespersons of the year. At which stage of the 
DIKW hierarchy is Sylvia working? 
Knowledge 
Which of the following statements describes the difference between information 
systems and information technology? 
An information system does not have to use computer hardware or software; whereas 
information technology requires the use of hardware and software. 
Which of the follow...
- Exam (elaborations)
- • 7 pages •
As a new sales manager, Sylvia is studying the historical and current sales report 
numbers to determine the top three salespersons of the year. At which stage of the 
DIKW hierarchy is Sylvia working? 
Knowledge 
Which of the following statements describes the difference between information 
systems and information technology? 
An information system does not have to use computer hardware or software; whereas 
information technology requires the use of hardware and software. 
Which of the follow...
WGU C182 Best Series.
The most common role in IT is the 
a program designed to be run by a Unix command-line interpreter, (used by an 
administrator to automate a process) to accomplish both simple and complex tasks. 
shell scripts 
- account management 
- password management 
- file protection management 
- installing and configuring new hardware and troubleshooting hardware including the 
network 
- installing and configuring new software including updating new operating system (OS) 
patches, and troubleshooting so...
- Exam (elaborations)
- • 58 pages •
The most common role in IT is the 
a program designed to be run by a Unix command-line interpreter, (used by an 
administrator to automate a process) to accomplish both simple and complex tasks. 
shell scripts 
- account management 
- password management 
- file protection management 
- installing and configuring new hardware and troubleshooting hardware including the 
network 
- installing and configuring new software including updating new operating system (OS) 
patches, and troubleshooting so...
WGU C182 Best Mark A.
DIKW Hierarchy 
Defines the transition of data to information from knowledge to wisdom. (Data 
Information Knowledge Wisdom) 
Data in DIKW 
The input directly received by the user (or computer). It is generally not usable until it 
has been converted into a relevant form. 
Information in DIKW 
Having been inferred
- Exam (elaborations)
- • 15 pages •
DIKW Hierarchy 
Defines the transition of data to information from knowledge to wisdom. (Data 
Information Knowledge Wisdom) 
Data in DIKW 
The input directly received by the user (or computer). It is generally not usable until it 
has been converted into a relevant form. 
Information in DIKW 
Having been inferred
WGU C182 Best Rated Series.
DIKW Hierarchy 
Defines the transition of data to information to knowledge to wisdom. (Data Information 
Knowledge Wisdom) 
Data in DIKW 
The input directly received by the user (or computer). It is generally not usable until it 
has been converted into a relevant form. 
Information in DIKW 
Having been inferred from data; one or more processes have been applied to the data 
to transform it into a more useful form. 
Knowledge in DIKW 
Information that has been put to use; information placed into...
- Exam (elaborations)
- • 15 pages •
DIKW Hierarchy 
Defines the transition of data to information to knowledge to wisdom. (Data Information 
Knowledge Wisdom) 
Data in DIKW 
The input directly received by the user (or computer). It is generally not usable until it 
has been converted into a relevant form. 
Information in DIKW 
Having been inferred from data; one or more processes have been applied to the data 
to transform it into a more useful form. 
Knowledge in DIKW 
Information that has been put to use; information placed into...
Pre-MPJE Exceptional Academic Excellence.
Good work
APEX EKG Test Perfect Your Scoring.