Questão 1
Questão
The single most expensive malicious attack was the 2000 __, which cost an estimated $8.7 billion.
Responda
-
a. Love Bug
-
b. Nimda
-
c. Slammer
-
d. Code Red
Questão 2
Questão
The __ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
Questão 3
Questão
Under the __, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
Responda
-
a. HLPDA
-
b. USHIPA
-
c. HIPAA
-
d. HCPA
Questão 4
Questão
What is another name for unsolicited e-mail messages?
Responda
-
a. trash
-
b. scam
-
c. spawn
-
d. spam
Questão 5
Questão
__ ensures that information is correct and that no unauthorized person or malicious software has altered that data
Responda
-
a. Identity
-
b. Confidentiality
-
c. Integrity
-
d. Availability
Questão 6
Questão
__ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
Responda
-
a. Encryption
-
b. Authentication
-
c. Accounting
-
d. Authorization
Questão 7
Questão
A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.
Responda
-
a. 10 to 14
-
b. 14 to 16
-
c. 12 to 15
-
d. 13 to 14
Questão 8
Questão
In information security, an example of a threat agent can be ____.
Responda
-
a. a force of nature such as a tornado that could destroy computer equipment
-
b. a virus that attacks a computer network
-
c. Both a and d
-
d. an unsecured computer network
Questão 9
Questão
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
Questão 10
Questão
The demand for IT professionals who know how to secure networks and computers is at an all-time low.
Questão 11
Questão
Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?
Responda
-
a. can span several years
-
b. targets sensitive propriety information
-
c. uses advanced tools and techniques
-
d. is only used by hactivists against foreign enemies
Questão 12
Questão
Which of the following was used to describe attackers who would break into a computer system without the owner's permission and publicly disclose the vulnerability?
Responda
-
a. white hat hackers
-
b. black hat hackers
-
c. blue hat hackers
-
d. gray hat hackers
Questão 13
Questão
Which of the following is NOT a reason why it is difficult to defend against today's attackers?
Responda
-
a. increased speed of attacks
-
b. simplicity of attack tools
-
c. greater sophistication of defense tools
-
d. delays in security updating
Questão 14
Questão
Why can brokers command such a high price for what they sell?
Responda
-
a. Brokers are licensed professionals.
-
b. The attack targets are always wealthy corporations.
-
c. The vulnerability was previously unknown and is unlikely to be patched quickly.
-
d. Brokers work in teams and all the members must be compensated.
Questão 15
Questão
Which phrase describes the term "security" in a general sense.
Responda
-
a. protection from only direct actions
-
b. using reverse attack vectors (RAV) for protection
-
c. only available on hardened computers and systems
-
d. the necessary steps to protect a person or property from harm
Questão 16
Questão
____ ensures that only authorized parties can view the information.
Responda
-
a. Confidentiality
-
b. Availability
-
c. Authorization
-
d. Integrity
Questão 17
Questão
Each of the following is a successive layer in which information security is achieved EXCEPT ____.
Responda
-
a. products
-
b. purposes
-
c. procedures
-
d. people
Questão 18
Questão
What is a person or element that has the power to carry out a threat.
Responda
-
a. threat agent
-
b. exploiter
-
c. risk agent
-
d. vulnerability
Questão 19
Questão
____ ensures that individuals are why they claim to be.
Responda
-
a. Demonstration
-
b. Accounting
-
c. Authentication
-
d. Certification
Questão 20
Questão
What is the difference between a hactivist and a cyberterrorist?
Responda
-
a. A hactivist is motivated by ideology while a cyberterrorist is not.
-
b. Cyberterrorists always work in groups while hactivists work alone.
-
c. The aim of a hactivist is not to incite panic like cyberterrorists.
-
d. Cyberterrorists are better funded than hactivists.
Questão 21
Questão
Each of the following is a goal of information security EXCEPT ____.
Questão 22
Questão
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
Responda
-
a. Hospital Protection and Insurance Association Agreement (HPIAA)
-
b. Sarbanes-Oxley (Sarbox)
-
c. Gramm-Leach-Bliley Act (GLBA)
-
d. Health Insurance Portability and Accountability Act (HIPAA)
Questão 23
Questão
Why do cyberterrorists target power plants, air traffic control centers, and water systems?
Responda
-
a. These targets have notoriously weak security and are easy to penetrate.
-
b. They can cause significant disruption by destroying only a few targets.
-
c. These targets are government-regulated and any successful attack would be considered a major victory.
-
d. The targets are privately owned and cannot afford high levels of security.
Questão 24
Questão
What is the first step in the Cyber Kill Chain?
Responda
-
a. weaponization
-
b. exploitation
-
c. actions on objectives
-
d. reconnaissance
Questão 25
Questão
An organization that purchased security products from different vendors is demonstrating which security principle?
Responda
-
a. obscurity
-
b. diversity
-
c. limiting
-
d. layering
Questão 26
Questão
Each of the following can be classified an "insider" EXCEPT ____.
Responda
-
a. business partners
-
b. contractors
-
c. stockholders
-
d. employees
Questão 27
Questão
What are attackers called who belong to a network of identity thieves and financial fraudsters?
Responda
-
a. cybercriminals
-
b. script kiddies
-
c. hackers
-
d. brokers
Questão 28
Questão
What is an objective of state-sponsored attackers?
Responda
-
a. to right a perceived wrong
-
b. to spy on citizens
-
c. to sell vulnerabilities to the highest bidder
-
d. fortune instead of fame
Questão 29
Questão
An example of ____ is not reveling they type of computer, operating system, software, and network connection a computer uses.
Responda
-
a. layering
-
b. diversity
-
c. obscurity
-
d. limiting
Questão 30
Questão
The ____ is primarily responsible for accessing, managing, and implementing security.