865 538
Quiz by , created more than 1 year ago

intro

39
0
0
865 538
Created by 865 538 over 7 years ago
Close

nsf_01

Question 1 of 30

1

The single most expensive malicious attack was the 2000 __, which cost an estimated $8.7 billion.

Select one of the following:

  • a. Love Bug

  • b. Nimda

  • c. Slammer

  • d. Code Red

Explanation

Question 2 of 30

1

The __ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

Select one of the following:

  • a. USA Patriot

  • b. Gramm-Leach-Bliley

  • c. California Database Security Breach

  • d. Sarbanes-Oxley

Explanation

Question 3 of 30

1

Under the __, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

Select one of the following:

  • a. HLPDA

  • b. USHIPA

  • c. HIPAA

  • d. HCPA

Explanation

Question 4 of 30

1

What is another name for unsolicited e-mail messages?

Select one of the following:

  • a. trash

  • b. scam

  • c. spawn

  • d. spam

Explanation

Question 5 of 30

1

__ ensures that information is correct and that no unauthorized person or malicious software has altered that data

Select one of the following:

  • a. Identity

  • b. Confidentiality

  • c. Integrity

  • d. Availability

Explanation

Question 6 of 30

1

__ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.

Select one of the following:

  • a. Encryption

  • b. Authentication

  • c. Accounting

  • d. Authorization

Explanation

Question 7 of 30

1

A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.

Select one of the following:

  • a. 10 to 14

  • b. 14 to 16

  • c. 12 to 15

  • d. 13 to 14

Explanation

Question 8 of 30

1

In information security, an example of a threat agent can be ____.

Select one of the following:

  • a. a force of nature such as a tornado that could destroy computer equipment

  • b. a virus that attacks a computer network

  • c. Both a and d

  • d. an unsecured computer network

Explanation

Question 9 of 30

1

Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.

Select one of the following:

  • True
  • False

Explanation

Question 10 of 30

1

The demand for IT professionals who know how to secure networks and computers is at an all-time low.

Select one of the following:

  • True
  • False

Explanation

Question 11 of 30

1

Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?

Select one of the following:

  • a. can span several years

  • b. targets sensitive propriety information

  • c. uses advanced tools and techniques

  • d. is only used by hactivists against foreign enemies

Explanation

Question 12 of 30

1

Which of the following was used to describe attackers who would break into a computer system without the owner's permission and publicly disclose the vulnerability?

Select one of the following:

  • a. white hat hackers

  • b. black hat hackers

  • c. blue hat hackers

  • d. gray hat hackers

Explanation

Question 13 of 30

1

Which of the following is NOT a reason why it is difficult to defend against today's attackers?

Select one of the following:

  • a. increased speed of attacks

  • b. simplicity of attack tools

  • c. greater sophistication of defense tools

  • d. delays in security updating

Explanation

Question 14 of 30

1

Why can brokers command such a high price for what they sell?

Select one of the following:

  • a. Brokers are licensed professionals.

  • b. The attack targets are always wealthy corporations.

  • c. The vulnerability was previously unknown and is unlikely to be patched quickly.

  • d. Brokers work in teams and all the members must be compensated.

Explanation

Question 15 of 30

1

Which phrase describes the term "security" in a general sense.

Select one of the following:

  • a. protection from only direct actions

  • b. using reverse attack vectors (RAV) for protection

  • c. only available on hardened computers and systems

  • d. the necessary steps to protect a person or property from harm

Explanation

Question 16 of 30

1

____ ensures that only authorized parties can view the information.

Select one of the following:

  • a. Confidentiality

  • b. Availability

  • c. Authorization

  • d. Integrity

Explanation

Question 17 of 30

1

Each of the following is a successive layer in which information security is achieved EXCEPT ____.

Select one of the following:

  • a. products

  • b. purposes

  • c. procedures

  • d. people

Explanation

Question 18 of 30

1

What is a person or element that has the power to carry out a threat.

Select one of the following:

  • a. threat agent

  • b. exploiter

  • c. risk agent

  • d. vulnerability

Explanation

Question 19 of 30

1

____ ensures that individuals are why they claim to be.

Select one of the following:

  • a. Demonstration

  • b. Accounting

  • c. Authentication

  • d. Certification

Explanation

Question 20 of 30

1

What is the difference between a hactivist and a cyberterrorist?

Select one of the following:

  • a. A hactivist is motivated by ideology while a cyberterrorist is not.

  • b. Cyberterrorists always work in groups while hactivists work alone.

  • c. The aim of a hactivist is not to incite panic like cyberterrorists.

  • d. Cyberterrorists are better funded than hactivists.

Explanation

Question 21 of 30

1

Each of the following is a goal of information security EXCEPT ____.

Select one of the following:

  • a. avoid legal consequences

  • b. foil cyberterrorism

  • c. prevent data theft

  • d. limit access control

Explanation

Question 22 of 30

1

Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?

Select one of the following:

  • a. Hospital Protection and Insurance Association Agreement (HPIAA)

  • b. Sarbanes-Oxley (Sarbox)

  • c. Gramm-Leach-Bliley Act (GLBA)

  • d. Health Insurance Portability and Accountability Act (HIPAA)

Explanation

Question 23 of 30

1

Why do cyberterrorists target power plants, air traffic control centers, and water systems?

Select one of the following:

  • a. These targets have notoriously weak security and are easy to penetrate.

  • b. They can cause significant disruption by destroying only a few targets.

  • c. These targets are government-regulated and any successful attack would be considered a major victory.

  • d. The targets are privately owned and cannot afford high levels of security.

Explanation

Question 24 of 30

1

What is the first step in the Cyber Kill Chain?

Select one of the following:

  • a. weaponization

  • b. exploitation

  • c. actions on objectives

  • d. reconnaissance

Explanation

Question 25 of 30

1

An organization that purchased security products from different vendors is demonstrating which security principle?

Select one of the following:

  • a. obscurity

  • b. diversity

  • c. limiting

  • d. layering

Explanation

Question 26 of 30

1

Each of the following can be classified an "insider" EXCEPT ____.

Select one of the following:

  • a. business partners

  • b. contractors

  • c. stockholders

  • d. employees

Explanation

Question 27 of 30

1

What are attackers called who belong to a network of identity thieves and financial fraudsters?

Select one of the following:

  • a. cybercriminals

  • b. script kiddies

  • c. hackers

  • d. brokers

Explanation

Question 28 of 30

1

What is an objective of state-sponsored attackers?

Select one of the following:

  • a. to right a perceived wrong

  • b. to spy on citizens

  • c. to sell vulnerabilities to the highest bidder

  • d. fortune instead of fame

Explanation

Question 29 of 30

1

An example of ____ is not reveling they type of computer, operating system, software, and network connection a computer uses.

Select one of the following:

  • a. layering

  • b. diversity

  • c. obscurity

  • d. limiting

Explanation

Question 30 of 30

1

The ____ is primarily responsible for accessing, managing, and implementing security.

Select one of the following:

  • a. security administrator

  • b. security manager

  • c. security technician

  • d. chief information security officer (CISO)

Explanation