APPENDIX AAnswers to the “Check Your Understanding” Questions

Chapter 1

1. C. Ransomware commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money.

2. D. Cyberwarfare is a subset of information warfare (IW). Its objective is to disrupt (availability), corrupt (integrity), or exploit (confidentiality or privacy). It can be directed against military forces, critical infrastructures, or other national interests, such as economic targets. It involves several teams that work together. A botnet might be one of several tools used for launching the attack.

3. A. A security information and event management system (SIEM) combines data from multiple sources to help SOC personnel collect and ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.