C Danvers
Quiz von , erstellt am more than 1 year ago

Ch. 1 midterm practice

230
0
0
C Danvers
Erstellt von C Danvers vor mehr als 6 Jahre
Schließen

Ch 1

Frage 1 von 40

1

To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?

Wähle eine der folgenden:

  • Slammer

  • Code Red

  • Love Bug

  • Nimda

Erklärung

Frage 2 von 40

1

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

Wähle eine der folgenden:

  • cyberterrorist

  • cybercriminal

  • script kiddies

  • hacker

Erklärung

Frage 3 von 40

1

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?

Wähle eine der folgenden:

  • Inside Attacks

  • Embedded Attacks

  • Advanced Persistent Threat

  • Modified Threat

Erklärung

Frage 4 von 40

1

Which position below is considered an entry-level position for a person who has the necessary technical skills?

Wähle eine der folgenden:

  • security administrator

  • security manager

  • CISO

  • security technician

Erklärung

Frage 5 von 40

1

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?

Wähle eine der folgenden:

  • nation state threats

  • state hackers

  • nation state actors

  • cyber military

Erklärung

Frage 6 von 40

1

Which of the three protections ensures that only authorized parties can view information?

Wähle eine der folgenden:

  • confidentiality

  • integrity

  • security

  • availability

Erklärung

Frage 7 von 40

1

What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents?

Wähle eine der folgenden:

  • hacking

  • cybercriminal

  • cracking

  • cyberterrorism

Erklärung

Frage 8 von 40

1

The CompTIA Security+ certification is a vendor-neutral credential

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 9 von 40

1

What type of diversity is being implemented if a company is using multiple security products from different manufacturers?

Wähle eine der folgenden:

  • vendor-control security

  • manufacturer diversity

  • vendor diversity

  • multiple-product security

Erklärung

Frage 10 von 40

1

Which of the following is a common security framework? (Choose all that apply.)

Wähle eine oder mehr der folgenden:

  • ISO

  • COBIT

  • ASA

  • RFC

Erklärung

Frage 11 von 40

1

A vulnerability is a flaw or weakness that allows a threat to bypass security.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 12 von 40

1

Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 13 von 40

1

The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 14 von 40

1

Select the term that best describes automated attack software?

Wähle eine der folgenden:

  • open-source utility

  • intrusion application

  • open-source intelligence

  • insider software

Erklärung

Frage 15 von 40

1

What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

Wähle eine der folgenden:

  • social scam

  • cyberterrorism

  • identity theft

  • phishing

Erklärung

Frage 16 von 40

1

The Security Administrator reports directly to the CIO.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 17 von 40

1

Which of the following are considered threat actors? (Choose all that apply.)

Wähle eine oder mehr der folgenden:

  • competitors

  • brokers

  • individuals

  • administrators

Erklärung

Frage 18 von 40

1

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

Wähle eine der folgenden:

  • USHIPA

  • HIPAA

  • HLPDA

  • HCPA

Erklärung

Frage 19 von 40

1

Smart phones give the owner of the device the ability to download security updates.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 20 von 40

1

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Wähle eine der folgenden:

  • control diversity

  • vendor diversity

  • technical controls

  • administrative controls

Erklärung

Frage 21 von 40

1

Which of the following describes various supporting structures for implementing security that provides a resource of how to create a secure IT environment? (Choose all that apply.)

Wähle eine oder mehr der folgenden:

  • reference architectures

  • industry-standard frameworks

  • reference frameworks

  • regulatory frameworks

Erklärung

Frage 22 von 40

1

To mitigate risk is the attempt to address risk by making the risk less serious

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 23 von 40

1

What term describes a layered security approach that provides the most comprehensive protection?

Wähle eine der folgenden:

  • defense-in-depth

  • diverse-defense

  • limiting-defense

  • comprehensive-security

Erklärung

Frage 24 von 40

1

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?

Wähle eine der folgenden:

  • remote

  • distributed

  • centered

  • local

Erklärung

Frage 25 von 40

1

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 26 von 40

1

What information security position reports to the CISO and supervises technicians, administrators, and security staff?

Wähle eine der folgenden:

  • security auditor

  • security manager

  • security administrator

  • security engineer

Erklärung

Frage 27 von 40

1

In information security, what can constitute a loss?

Wähle eine der folgenden:

  • the loss of good will or reputation

  • all of the above

  • theft of information

  • a delay in transmitting information that results in a financial penalty

Erklärung

Frage 28 von 40

1

As security is increased, convenience is often increased.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 29 von 40

1

Which of the following ensures that data is accessible to authorized users?

Wähle eine der folgenden:

  • identity

  • integrity

  • confidentiality

  • availability

Erklärung

Frage 30 von 40

1

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?

Wähle eine der folgenden:

  • secure solution

  • silver bullet

  • approved action

  • unicorn

Erklärung

Frage 31 von 40

1

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

Wähle eine der folgenden:

  • logical security

  • physical security

  • information security

  • network security

Erklärung

Frage 32 von 40

1

In information security, which of the following is an example of a threat actor?

Wähle eine der folgenden:

  • all of the above

  • a force of nature such as a tornado that could destroy computer equipment

  • a virus that attacks a computer network

  • a person attempting to break into a secure computer network

Erklärung

Frage 33 von 40

1

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

Wähle eine der folgenden:

  • Sarbanes-Oxley

  • California Database Security Breach

  • USA Patriot

  • Gramm-Leach-Bliley

Erklärung

Frage 34 von 40

1

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

Wähle eine der folgenden:

  • availability

  • identity

  • integrity

  • confidentiality

Erklärung

Frage 35 von 40

1

What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?

Wähle eine der folgenden:

  • hactivists

  • hacker

  • script kiddies

  • cyberterrorist

Erklärung

Frage 36 von 40

1

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?

Wähle eine der folgenden:

  • $500,000

  • $50,000

  • $1,500,000

  • $250,000

Erklärung

Frage 37 von 40

1

What level of security access should a computer user have to do their job?

Wähle eine der folgenden:

  • password protected

  • authorized access

  • limiting amount

  • least amount

Erklärung

Frage 38 von 40

1

Which of the following is a valid fundamental security principle? (Choose all that apply.)

Wähle eine oder mehr der folgenden:

  • simplicity

  • layering

  • signature

  • diversity

Erklärung

Frage 39 von 40

1

Brokers steal new product research or a list of current customers to gain a competitive advantage.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 40 von 40

1

According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?

Wähle eine der folgenden:

  • 18

  • 27

  • 10

  • 15

Erklärung