Ch 1

Beschreibung

Ch. 1 midterm practice
C Danvers
Quiz von C Danvers, aktualisiert more than 1 year ago
C Danvers
Erstellt von C Danvers vor etwa 6 Jahre
225
0

Zusammenfassung der Ressource

Frage 1

Frage
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?
Antworten
  • Slammer
  • Code Red
  • Love Bug
  • Nimda

Frage 2

Frage
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?
Antworten
  • cyberterrorist
  • cybercriminal
  • script kiddies
  • hacker

Frage 3

Frage
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?
Antworten
  • Inside Attacks
  • Embedded Attacks
  • Advanced Persistent Threat
  • Modified Threat

Frage 4

Frage
Which position below is considered an entry-level position for a person who has the necessary technical skills?
Antworten
  • security administrator
  • security manager
  • CISO
  • security technician

Frage 5

Frage
What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?
Antworten
  • nation state threats
  • state hackers
  • nation state actors
  • cyber military

Frage 6

Frage
Which of the three protections ensures that only authorized parties can view information?
Antworten
  • confidentiality
  • integrity
  • security
  • availability

Frage 7

Frage
What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents?
Antworten
  • hacking
  • cybercriminal
  • cracking
  • cyberterrorism

Frage 8

Frage
The CompTIA Security+ certification is a vendor-neutral credential
Antworten
  • True
  • False

Frage 9

Frage
What type of diversity is being implemented if a company is using multiple security products from different manufacturers?
Antworten
  • vendor-control security
  • manufacturer diversity
  • vendor diversity
  • multiple-product security

Frage 10

Frage
Which of the following is a common security framework? (Choose all that apply.)
Antworten
  • ISO
  • COBIT
  • ASA
  • RFC

Frage 11

Frage
A vulnerability is a flaw or weakness that allows a threat to bypass security.
Antworten
  • True
  • False

Frage 12

Frage
Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.
Antworten
  • True
  • False

Frage 13

Frage
The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.
Antworten
  • True
  • False

Frage 14

Frage
Select the term that best describes automated attack software?
Antworten
  • open-source utility
  • intrusion application
  • open-source intelligence
  • insider software

Frage 15

Frage
What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?
Antworten
  • social scam
  • cyberterrorism
  • identity theft
  • phishing

Frage 16

Frage
The Security Administrator reports directly to the CIO.
Antworten
  • True
  • False

Frage 17

Frage
Which of the following are considered threat actors? (Choose all that apply.)
Antworten
  • competitors
  • brokers
  • individuals
  • administrators

Frage 18

Frage
Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
Antworten
  • USHIPA
  • HIPAA
  • HLPDA
  • HCPA

Frage 19

Frage
Smart phones give the owner of the device the ability to download security updates.
Antworten
  • True
  • False

Frage 20

Frage
What process describes using technology as a basis for controlling the access and usage of sensitive data?
Antworten
  • control diversity
  • vendor diversity
  • technical controls
  • administrative controls

Frage 21

Frage
Which of the following describes various supporting structures for implementing security that provides a resource of how to create a secure IT environment? (Choose all that apply.)
Antworten
  • reference architectures
  • industry-standard frameworks
  • reference frameworks
  • regulatory frameworks

Frage 22

Frage
To mitigate risk is the attempt to address risk by making the risk less serious
Antworten
  • True
  • False

Frage 23

Frage
What term describes a layered security approach that provides the most comprehensive protection?
Antworten
  • defense-in-depth
  • diverse-defense
  • limiting-defense
  • comprehensive-security

Frage 24

Frage
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?
Antworten
  • remote
  • distributed
  • centered
  • local

Frage 25

Frage
One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.
Antworten
  • True
  • False

Frage 26

Frage
What information security position reports to the CISO and supervises technicians, administrators, and security staff?
Antworten
  • security auditor
  • security manager
  • security administrator
  • security engineer

Frage 27

Frage
In information security, what can constitute a loss?
Antworten
  • the loss of good will or reputation
  • all of the above
  • theft of information
  • a delay in transmitting information that results in a financial penalty

Frage 28

Frage
As security is increased, convenience is often increased.
Antworten
  • True
  • False

Frage 29

Frage
Which of the following ensures that data is accessible to authorized users?
Antworten
  • identity
  • integrity
  • confidentiality
  • availability

Frage 30

Frage
What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?
Antworten
  • secure solution
  • silver bullet
  • approved action
  • unicorn

Frage 31

Frage
Which term below is frequently used to describe the tasks of securing information that is in a digital format?
Antworten
  • logical security
  • physical security
  • information security
  • network security

Frage 32

Frage
In information security, which of the following is an example of a threat actor?
Antworten
  • all of the above
  • a force of nature such as a tornado that could destroy computer equipment
  • a virus that attacks a computer network
  • a person attempting to break into a secure computer network

Frage 33

Frage
Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?
Antworten
  • Sarbanes-Oxley
  • California Database Security Breach
  • USA Patriot
  • Gramm-Leach-Bliley

Frage 34

Frage
Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
Antworten
  • availability
  • identity
  • integrity
  • confidentiality

Frage 35

Frage
What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?
Antworten
  • hactivists
  • hacker
  • script kiddies
  • cyberterrorist

Frage 36

Frage
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
Antworten
  • $500,000
  • $50,000
  • $1,500,000
  • $250,000

Frage 37

Frage
What level of security access should a computer user have to do their job?
Antworten
  • password protected
  • authorized access
  • limiting amount
  • least amount

Frage 38

Frage
Which of the following is a valid fundamental security principle? (Choose all that apply.)
Antworten
  • simplicity
  • layering
  • signature
  • diversity

Frage 39

Frage
Brokers steal new product research or a list of current customers to gain a competitive advantage.
Antworten
  • True
  • False

Frage 40

Frage
According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?
Antworten
  • 18
  • 27
  • 10
  • 15
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002