nsf_01

Descripción

intro
865 538
Test por 865 538, actualizado hace más de 1 año
865 538
Creado por 865 538 hace casi 8 años
41
0

Resumen del Recurso

Pregunta 1

Pregunta
The single most expensive malicious attack was the 2000 __, which cost an estimated $8.7 billion.
Respuesta
  • a. Love Bug
  • b. Nimda
  • c. Slammer
  • d. Code Red

Pregunta 2

Pregunta
The __ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
Respuesta
  • a. USA Patriot
  • b. Gramm-Leach-Bliley
  • c. California Database Security Breach
  • d. Sarbanes-Oxley

Pregunta 3

Pregunta
Under the __, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
Respuesta
  • a. HLPDA
  • b. USHIPA
  • c. HIPAA
  • d. HCPA

Pregunta 4

Pregunta
What is another name for unsolicited e-mail messages?
Respuesta
  • a. trash
  • b. scam
  • c. spawn
  • d. spam

Pregunta 5

Pregunta
__ ensures that information is correct and that no unauthorized person or malicious software has altered that data
Respuesta
  • a. Identity
  • b. Confidentiality
  • c. Integrity
  • d. Availability

Pregunta 6

Pregunta
__ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
Respuesta
  • a. Encryption
  • b. Authentication
  • c. Accounting
  • d. Authorization

Pregunta 7

Pregunta
A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.
Respuesta
  • a. 10 to 14
  • b. 14 to 16
  • c. 12 to 15
  • d. 13 to 14

Pregunta 8

Pregunta
In information security, an example of a threat agent can be ____.
Respuesta
  • a. a force of nature such as a tornado that could destroy computer equipment
  • b. a virus that attacks a computer network
  • c. Both a and d
  • d. an unsecured computer network

Pregunta 9

Pregunta
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
Respuesta
  • True
  • False

Pregunta 10

Pregunta
The demand for IT professionals who know how to secure networks and computers is at an all-time low.
Respuesta
  • True
  • False

Pregunta 11

Pregunta
Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?
Respuesta
  • a. can span several years
  • b. targets sensitive propriety information
  • c. uses advanced tools and techniques
  • d. is only used by hactivists against foreign enemies

Pregunta 12

Pregunta
Which of the following was used to describe attackers who would break into a computer system without the owner's permission and publicly disclose the vulnerability?
Respuesta
  • a. white hat hackers
  • b. black hat hackers
  • c. blue hat hackers
  • d. gray hat hackers

Pregunta 13

Pregunta
Which of the following is NOT a reason why it is difficult to defend against today's attackers?
Respuesta
  • a. increased speed of attacks
  • b. simplicity of attack tools
  • c. greater sophistication of defense tools
  • d. delays in security updating

Pregunta 14

Pregunta
Why can brokers command such a high price for what they sell?
Respuesta
  • a. Brokers are licensed professionals.
  • b. The attack targets are always wealthy corporations.
  • c. The vulnerability was previously unknown and is unlikely to be patched quickly.
  • d. Brokers work in teams and all the members must be compensated.

Pregunta 15

Pregunta
Which phrase describes the term "security" in a general sense.
Respuesta
  • a. protection from only direct actions
  • b. using reverse attack vectors (RAV) for protection
  • c. only available on hardened computers and systems
  • d. the necessary steps to protect a person or property from harm

Pregunta 16

Pregunta
____ ensures that only authorized parties can view the information.
Respuesta
  • a. Confidentiality
  • b. Availability
  • c. Authorization
  • d. Integrity

Pregunta 17

Pregunta
Each of the following is a successive layer in which information security is achieved EXCEPT ____.
Respuesta
  • a. products
  • b. purposes
  • c. procedures
  • d. people

Pregunta 18

Pregunta
What is a person or element that has the power to carry out a threat.
Respuesta
  • a. threat agent
  • b. exploiter
  • c. risk agent
  • d. vulnerability

Pregunta 19

Pregunta
____ ensures that individuals are why they claim to be.
Respuesta
  • a. Demonstration
  • b. Accounting
  • c. Authentication
  • d. Certification

Pregunta 20

Pregunta
What is the difference between a hactivist and a cyberterrorist?
Respuesta
  • a. A hactivist is motivated by ideology while a cyberterrorist is not.
  • b. Cyberterrorists always work in groups while hactivists work alone.
  • c. The aim of a hactivist is not to incite panic like cyberterrorists.
  • d. Cyberterrorists are better funded than hactivists.

Pregunta 21

Pregunta
Each of the following is a goal of information security EXCEPT ____.
Respuesta
  • a. avoid legal consequences
  • b. foil cyberterrorism
  • c. prevent data theft
  • d. limit access control

Pregunta 22

Pregunta
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
Respuesta
  • a. Hospital Protection and Insurance Association Agreement (HPIAA)
  • b. Sarbanes-Oxley (Sarbox)
  • c. Gramm-Leach-Bliley Act (GLBA)
  • d. Health Insurance Portability and Accountability Act (HIPAA)

Pregunta 23

Pregunta
Why do cyberterrorists target power plants, air traffic control centers, and water systems?
Respuesta
  • a. These targets have notoriously weak security and are easy to penetrate.
  • b. They can cause significant disruption by destroying only a few targets.
  • c. These targets are government-regulated and any successful attack would be considered a major victory.
  • d. The targets are privately owned and cannot afford high levels of security.

Pregunta 24

Pregunta
What is the first step in the Cyber Kill Chain?
Respuesta
  • a. weaponization
  • b. exploitation
  • c. actions on objectives
  • d. reconnaissance

Pregunta 25

Pregunta
An organization that purchased security products from different vendors is demonstrating which security principle?
Respuesta
  • a. obscurity
  • b. diversity
  • c. limiting
  • d. layering

Pregunta 26

Pregunta
Each of the following can be classified an "insider" EXCEPT ____.
Respuesta
  • a. business partners
  • b. contractors
  • c. stockholders
  • d. employees

Pregunta 27

Pregunta
What are attackers called who belong to a network of identity thieves and financial fraudsters?
Respuesta
  • a. cybercriminals
  • b. script kiddies
  • c. hackers
  • d. brokers

Pregunta 28

Pregunta
What is an objective of state-sponsored attackers?
Respuesta
  • a. to right a perceived wrong
  • b. to spy on citizens
  • c. to sell vulnerabilities to the highest bidder
  • d. fortune instead of fame

Pregunta 29

Pregunta
An example of ____ is not reveling they type of computer, operating system, software, and network connection a computer uses.
Respuesta
  • a. layering
  • b. diversity
  • c. obscurity
  • d. limiting

Pregunta 30

Pregunta
The ____ is primarily responsible for accessing, managing, and implementing security.
Respuesta
  • a. security administrator
  • b. security manager
  • c. security technician
  • d. chief information security officer (CISO)
Mostrar resumen completo Ocultar resumen completo

Similar

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_09(11)
865 538
nsf_04(15)
865 538
nsf_05(4)
865 538
nsf_06(7)
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
LECTURAS...
JL Cadenas