True or False? In cyber operations, we want to “trust but verify” in practice.
True or False? IDS and infrastructure monitors can be centra…
True or False? IDS and infrastructure monitors can be centralized, known as agentless, or they can be distributed, or agent-based.
Certifications are conducted by official auditors, which may…
Certifications are conducted by official auditors, which may result in one of four accreditation levels ranging from:
In a graph database, edges or relationships are the:
In a graph database, edges or relationships are the:
True or False? The possibility that a threat will be carried…
True or False? The possibility that a threat will be carried out is a risk.
True or False? A virtual machine requires a self-contained s…
True or False? A virtual machine requires a self-contained system such as Docker to work properly.
Which of the below scientists developed the concept of binom…
Which of the below scientists developed the concept of binomial nomenclature?
What is the required calculator for this course?
What is the required calculator for this course?
True or False? Social media is often used by attackers to di…
True or False? Social media is often used by attackers to distribute misinformation in electronic newsletters to try to damage their targets.
This course requires students to have a computer with a webc…
This course requires students to have a computer with a webcam and microphone.