Pregunta 1
Pregunta
The single most expensive malicious attack was the 2000 __, which cost an estimated $8.7 billion.
Respuesta
-
a. Love Bug
-
b. Nimda
-
c. Slammer
-
d. Code Red
Pregunta 2
Pregunta
The __ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
Pregunta 3
Pregunta
Under the __, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
Respuesta
-
a. HLPDA
-
b. USHIPA
-
c. HIPAA
-
d. HCPA
Pregunta 4
Pregunta
What is another name for unsolicited e-mail messages?
Respuesta
-
a. trash
-
b. scam
-
c. spawn
-
d. spam
Pregunta 5
Pregunta
__ ensures that information is correct and that no unauthorized person or malicious software has altered that data
Respuesta
-
a. Identity
-
b. Confidentiality
-
c. Integrity
-
d. Availability
Pregunta 6
Pregunta
__ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
Respuesta
-
a. Encryption
-
b. Authentication
-
c. Accounting
-
d. Authorization
Pregunta 7
Pregunta
A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.
Respuesta
-
a. 10 to 14
-
b. 14 to 16
-
c. 12 to 15
-
d. 13 to 14
Pregunta 8
Pregunta
In information security, an example of a threat agent can be ____.
Respuesta
-
a. a force of nature such as a tornado that could destroy computer equipment
-
b. a virus that attacks a computer network
-
c. Both a and d
-
d. an unsecured computer network
Pregunta 9
Pregunta
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
Pregunta 10
Pregunta
The demand for IT professionals who know how to secure networks and computers is at an all-time low.
Pregunta 11
Pregunta
Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?
Respuesta
-
a. can span several years
-
b. targets sensitive propriety information
-
c. uses advanced tools and techniques
-
d. is only used by hactivists against foreign enemies
Pregunta 12
Pregunta
Which of the following was used to describe attackers who would break into a computer system without the owner's permission and publicly disclose the vulnerability?
Respuesta
-
a. white hat hackers
-
b. black hat hackers
-
c. blue hat hackers
-
d. gray hat hackers
Pregunta 13
Pregunta
Which of the following is NOT a reason why it is difficult to defend against today's attackers?
Respuesta
-
a. increased speed of attacks
-
b. simplicity of attack tools
-
c. greater sophistication of defense tools
-
d. delays in security updating
Pregunta 14
Pregunta
Why can brokers command such a high price for what they sell?
Respuesta
-
a. Brokers are licensed professionals.
-
b. The attack targets are always wealthy corporations.
-
c. The vulnerability was previously unknown and is unlikely to be patched quickly.
-
d. Brokers work in teams and all the members must be compensated.
Pregunta 15
Pregunta
Which phrase describes the term "security" in a general sense.
Respuesta
-
a. protection from only direct actions
-
b. using reverse attack vectors (RAV) for protection
-
c. only available on hardened computers and systems
-
d. the necessary steps to protect a person or property from harm
Pregunta 16
Pregunta
____ ensures that only authorized parties can view the information.
Respuesta
-
a. Confidentiality
-
b. Availability
-
c. Authorization
-
d. Integrity
Pregunta 17
Pregunta
Each of the following is a successive layer in which information security is achieved EXCEPT ____.
Respuesta
-
a. products
-
b. purposes
-
c. procedures
-
d. people
Pregunta 18
Pregunta
What is a person or element that has the power to carry out a threat.
Respuesta
-
a. threat agent
-
b. exploiter
-
c. risk agent
-
d. vulnerability
Pregunta 19
Pregunta
____ ensures that individuals are why they claim to be.
Respuesta
-
a. Demonstration
-
b. Accounting
-
c. Authentication
-
d. Certification
Pregunta 20
Pregunta
What is the difference between a hactivist and a cyberterrorist?
Respuesta
-
a. A hactivist is motivated by ideology while a cyberterrorist is not.
-
b. Cyberterrorists always work in groups while hactivists work alone.
-
c. The aim of a hactivist is not to incite panic like cyberterrorists.
-
d. Cyberterrorists are better funded than hactivists.
Pregunta 21
Pregunta
Each of the following is a goal of information security EXCEPT ____.
Pregunta 22
Pregunta
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
Respuesta
-
a. Hospital Protection and Insurance Association Agreement (HPIAA)
-
b. Sarbanes-Oxley (Sarbox)
-
c. Gramm-Leach-Bliley Act (GLBA)
-
d. Health Insurance Portability and Accountability Act (HIPAA)
Pregunta 23
Pregunta
Why do cyberterrorists target power plants, air traffic control centers, and water systems?
Respuesta
-
a. These targets have notoriously weak security and are easy to penetrate.
-
b. They can cause significant disruption by destroying only a few targets.
-
c. These targets are government-regulated and any successful attack would be considered a major victory.
-
d. The targets are privately owned and cannot afford high levels of security.
Pregunta 24
Pregunta
What is the first step in the Cyber Kill Chain?
Respuesta
-
a. weaponization
-
b. exploitation
-
c. actions on objectives
-
d. reconnaissance
Pregunta 25
Pregunta
An organization that purchased security products from different vendors is demonstrating which security principle?
Respuesta
-
a. obscurity
-
b. diversity
-
c. limiting
-
d. layering
Pregunta 26
Pregunta
Each of the following can be classified an "insider" EXCEPT ____.
Respuesta
-
a. business partners
-
b. contractors
-
c. stockholders
-
d. employees
Pregunta 27
Pregunta
What are attackers called who belong to a network of identity thieves and financial fraudsters?
Respuesta
-
a. cybercriminals
-
b. script kiddies
-
c. hackers
-
d. brokers
Pregunta 28
Pregunta
What is an objective of state-sponsored attackers?
Respuesta
-
a. to right a perceived wrong
-
b. to spy on citizens
-
c. to sell vulnerabilities to the highest bidder
-
d. fortune instead of fame
Pregunta 29
Pregunta
An example of ____ is not reveling they type of computer, operating system, software, and network connection a computer uses.
Respuesta
-
a. layering
-
b. diversity
-
c. obscurity
-
d. limiting
Pregunta 30
Pregunta
The ____ is primarily responsible for accessing, managing, and implementing security.