1. A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with? black hat hackers gray hat hackers script kiddies white hat hackers Explanation: Hackers are classified by colors to help define the purpose of their break-in activities. 2. Which statement best describes a motivation of hacktivists? They are trying to show off their hacking skills. They are interested in discovering new exploits. They are curious and learning hacking skills. They are part of a protest group behind a political cause. Explanation: Each type of cybercriminal has a distinct motivation for his or her actions. 3. What is an example of early warning systems that can be used to thwart cybercriminals? Infragard ISO/IEC 27000 program Honeynet project CVE database Explanation: Early warning systems help identify attacks and can be used by cybersecurity specialists to protect systems. 4. Which technology should be used to enforce the security policy that a computing device must be checked against the latest antivirus update before the device is allowed to connect to the campus network? SAN VPN NAC NAS Explanation: A cybersecurity specialist must be aware of the technologies