C Danvers
Quiz by , created more than 1 year ago

Ch. 1 midterm practice

225
0
0
C Danvers
Created by C Danvers about 6 years ago
Close

Ch 1

Question 1 of 40

1

To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?

Select one of the following:

  • Slammer

  • Code Red

  • Love Bug

  • Nimda

Explanation

Question 2 of 40

1

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

Select one of the following:

  • cyberterrorist

  • cybercriminal

  • script kiddies

  • hacker

Explanation

Question 3 of 40

1

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?

Select one of the following:

  • Inside Attacks

  • Embedded Attacks

  • Advanced Persistent Threat

  • Modified Threat

Explanation

Question 4 of 40

1

Which position below is considered an entry-level position for a person who has the necessary technical skills?

Select one of the following:

  • security administrator

  • security manager

  • CISO

  • security technician

Explanation

Question 5 of 40

1

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?

Select one of the following:

  • nation state threats

  • state hackers

  • nation state actors

  • cyber military

Explanation

Question 6 of 40

1

Which of the three protections ensures that only authorized parties can view information?

Select one of the following:

  • confidentiality

  • integrity

  • security

  • availability

Explanation

Question 7 of 40

1

What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents?

Select one of the following:

  • hacking

  • cybercriminal

  • cracking

  • cyberterrorism

Explanation

Question 8 of 40

1

The CompTIA Security+ certification is a vendor-neutral credential

Select one of the following:

  • True
  • False

Explanation

Question 9 of 40

1

What type of diversity is being implemented if a company is using multiple security products from different manufacturers?

Select one of the following:

  • vendor-control security

  • manufacturer diversity

  • vendor diversity

  • multiple-product security

Explanation

Question 10 of 40

1

Which of the following is a common security framework? (Choose all that apply.)

Select one or more of the following:

  • ISO

  • COBIT

  • ASA

  • RFC

Explanation

Question 11 of 40

1

A vulnerability is a flaw or weakness that allows a threat to bypass security.

Select one of the following:

  • True
  • False

Explanation

Question 12 of 40

1

Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.

Select one of the following:

  • True
  • False

Explanation

Question 13 of 40

1

The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.

Select one of the following:

  • True
  • False

Explanation

Question 14 of 40

1

Select the term that best describes automated attack software?

Select one of the following:

  • open-source utility

  • intrusion application

  • open-source intelligence

  • insider software

Explanation

Question 15 of 40

1

What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

Select one of the following:

  • social scam

  • cyberterrorism

  • identity theft

  • phishing

Explanation

Question 16 of 40

1

The Security Administrator reports directly to the CIO.

Select one of the following:

  • True
  • False

Explanation

Question 17 of 40

1

Which of the following are considered threat actors? (Choose all that apply.)

Select one or more of the following:

  • competitors

  • brokers

  • individuals

  • administrators

Explanation

Question 18 of 40

1

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

Select one of the following:

  • USHIPA

  • HIPAA

  • HLPDA

  • HCPA

Explanation

Question 19 of 40

1

Smart phones give the owner of the device the ability to download security updates.

Select one of the following:

  • True
  • False

Explanation

Question 20 of 40

1

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Select one of the following:

  • control diversity

  • vendor diversity

  • technical controls

  • administrative controls

Explanation

Question 21 of 40

1

Which of the following describes various supporting structures for implementing security that provides a resource of how to create a secure IT environment? (Choose all that apply.)

Select one or more of the following:

  • reference architectures

  • industry-standard frameworks

  • reference frameworks

  • regulatory frameworks

Explanation

Question 22 of 40

1

To mitigate risk is the attempt to address risk by making the risk less serious

Select one of the following:

  • True
  • False

Explanation

Question 23 of 40

1

What term describes a layered security approach that provides the most comprehensive protection?

Select one of the following:

  • defense-in-depth

  • diverse-defense

  • limiting-defense

  • comprehensive-security

Explanation

Question 24 of 40

1

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?

Select one of the following:

  • remote

  • distributed

  • centered

  • local

Explanation

Question 25 of 40

1

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.

Select one of the following:

  • True
  • False

Explanation

Question 26 of 40

1

What information security position reports to the CISO and supervises technicians, administrators, and security staff?

Select one of the following:

  • security auditor

  • security manager

  • security administrator

  • security engineer

Explanation

Question 27 of 40

1

In information security, what can constitute a loss?

Select one of the following:

  • the loss of good will or reputation

  • all of the above

  • theft of information

  • a delay in transmitting information that results in a financial penalty

Explanation

Question 28 of 40

1

As security is increased, convenience is often increased.

Select one of the following:

  • True
  • False

Explanation

Question 29 of 40

1

Which of the following ensures that data is accessible to authorized users?

Select one of the following:

  • identity

  • integrity

  • confidentiality

  • availability

Explanation

Question 30 of 40

1

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?

Select one of the following:

  • secure solution

  • silver bullet

  • approved action

  • unicorn

Explanation

Question 31 of 40

1

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

Select one of the following:

  • logical security

  • physical security

  • information security

  • network security

Explanation

Question 32 of 40

1

In information security, which of the following is an example of a threat actor?

Select one of the following:

  • all of the above

  • a force of nature such as a tornado that could destroy computer equipment

  • a virus that attacks a computer network

  • a person attempting to break into a secure computer network

Explanation

Question 33 of 40

1

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

Select one of the following:

  • Sarbanes-Oxley

  • California Database Security Breach

  • USA Patriot

  • Gramm-Leach-Bliley

Explanation

Question 34 of 40

1

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

Select one of the following:

  • availability

  • identity

  • integrity

  • confidentiality

Explanation

Question 35 of 40

1

What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?

Select one of the following:

  • hactivists

  • hacker

  • script kiddies

  • cyberterrorist

Explanation

Question 36 of 40

1

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?

Select one of the following:

  • $500,000

  • $50,000

  • $1,500,000

  • $250,000

Explanation

Question 37 of 40

1

What level of security access should a computer user have to do their job?

Select one of the following:

  • password protected

  • authorized access

  • limiting amount

  • least amount

Explanation

Question 38 of 40

1

Which of the following is a valid fundamental security principle? (Choose all that apply.)

Select one or more of the following:

  • simplicity

  • layering

  • signature

  • diversity

Explanation

Question 39 of 40

1

Brokers steal new product research or a list of current customers to gain a competitive advantage.

Select one of the following:

  • True
  • False

Explanation

Question 40 of 40

1

According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?

Select one of the following:

  • 18

  • 27

  • 10

  • 15

Explanation