nsf_01

Descrição

intro
865 538
Quiz por 865 538, atualizado more than 1 year ago
865 538
Criado por 865 538 quase 8 anos atrás
41
0

Resumo de Recurso

Questão 1

Questão
The single most expensive malicious attack was the 2000 __, which cost an estimated $8.7 billion.
Responda
  • a. Love Bug
  • b. Nimda
  • c. Slammer
  • d. Code Red

Questão 2

Questão
The __ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
Responda
  • a. USA Patriot
  • b. Gramm-Leach-Bliley
  • c. California Database Security Breach
  • d. Sarbanes-Oxley

Questão 3

Questão
Under the __, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
Responda
  • a. HLPDA
  • b. USHIPA
  • c. HIPAA
  • d. HCPA

Questão 4

Questão
What is another name for unsolicited e-mail messages?
Responda
  • a. trash
  • b. scam
  • c. spawn
  • d. spam

Questão 5

Questão
__ ensures that information is correct and that no unauthorized person or malicious software has altered that data
Responda
  • a. Identity
  • b. Confidentiality
  • c. Integrity
  • d. Availability

Questão 6

Questão
__ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
Responda
  • a. Encryption
  • b. Authentication
  • c. Accounting
  • d. Authorization

Questão 7

Questão
A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.
Responda
  • a. 10 to 14
  • b. 14 to 16
  • c. 12 to 15
  • d. 13 to 14

Questão 8

Questão
In information security, an example of a threat agent can be ____.
Responda
  • a. a force of nature such as a tornado that could destroy computer equipment
  • b. a virus that attacks a computer network
  • c. Both a and d
  • d. an unsecured computer network

Questão 9

Questão
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
Responda
  • True
  • False

Questão 10

Questão
The demand for IT professionals who know how to secure networks and computers is at an all-time low.
Responda
  • True
  • False

Questão 11

Questão
Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?
Responda
  • a. can span several years
  • b. targets sensitive propriety information
  • c. uses advanced tools and techniques
  • d. is only used by hactivists against foreign enemies

Questão 12

Questão
Which of the following was used to describe attackers who would break into a computer system without the owner's permission and publicly disclose the vulnerability?
Responda
  • a. white hat hackers
  • b. black hat hackers
  • c. blue hat hackers
  • d. gray hat hackers

Questão 13

Questão
Which of the following is NOT a reason why it is difficult to defend against today's attackers?
Responda
  • a. increased speed of attacks
  • b. simplicity of attack tools
  • c. greater sophistication of defense tools
  • d. delays in security updating

Questão 14

Questão
Why can brokers command such a high price for what they sell?
Responda
  • a. Brokers are licensed professionals.
  • b. The attack targets are always wealthy corporations.
  • c. The vulnerability was previously unknown and is unlikely to be patched quickly.
  • d. Brokers work in teams and all the members must be compensated.

Questão 15

Questão
Which phrase describes the term "security" in a general sense.
Responda
  • a. protection from only direct actions
  • b. using reverse attack vectors (RAV) for protection
  • c. only available on hardened computers and systems
  • d. the necessary steps to protect a person or property from harm

Questão 16

Questão
____ ensures that only authorized parties can view the information.
Responda
  • a. Confidentiality
  • b. Availability
  • c. Authorization
  • d. Integrity

Questão 17

Questão
Each of the following is a successive layer in which information security is achieved EXCEPT ____.
Responda
  • a. products
  • b. purposes
  • c. procedures
  • d. people

Questão 18

Questão
What is a person or element that has the power to carry out a threat.
Responda
  • a. threat agent
  • b. exploiter
  • c. risk agent
  • d. vulnerability

Questão 19

Questão
____ ensures that individuals are why they claim to be.
Responda
  • a. Demonstration
  • b. Accounting
  • c. Authentication
  • d. Certification

Questão 20

Questão
What is the difference between a hactivist and a cyberterrorist?
Responda
  • a. A hactivist is motivated by ideology while a cyberterrorist is not.
  • b. Cyberterrorists always work in groups while hactivists work alone.
  • c. The aim of a hactivist is not to incite panic like cyberterrorists.
  • d. Cyberterrorists are better funded than hactivists.

Questão 21

Questão
Each of the following is a goal of information security EXCEPT ____.
Responda
  • a. avoid legal consequences
  • b. foil cyberterrorism
  • c. prevent data theft
  • d. limit access control

Questão 22

Questão
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
Responda
  • a. Hospital Protection and Insurance Association Agreement (HPIAA)
  • b. Sarbanes-Oxley (Sarbox)
  • c. Gramm-Leach-Bliley Act (GLBA)
  • d. Health Insurance Portability and Accountability Act (HIPAA)

Questão 23

Questão
Why do cyberterrorists target power plants, air traffic control centers, and water systems?
Responda
  • a. These targets have notoriously weak security and are easy to penetrate.
  • b. They can cause significant disruption by destroying only a few targets.
  • c. These targets are government-regulated and any successful attack would be considered a major victory.
  • d. The targets are privately owned and cannot afford high levels of security.

Questão 24

Questão
What is the first step in the Cyber Kill Chain?
Responda
  • a. weaponization
  • b. exploitation
  • c. actions on objectives
  • d. reconnaissance

Questão 25

Questão
An organization that purchased security products from different vendors is demonstrating which security principle?
Responda
  • a. obscurity
  • b. diversity
  • c. limiting
  • d. layering

Questão 26

Questão
Each of the following can be classified an "insider" EXCEPT ____.
Responda
  • a. business partners
  • b. contractors
  • c. stockholders
  • d. employees

Questão 27

Questão
What are attackers called who belong to a network of identity thieves and financial fraudsters?
Responda
  • a. cybercriminals
  • b. script kiddies
  • c. hackers
  • d. brokers

Questão 28

Questão
What is an objective of state-sponsored attackers?
Responda
  • a. to right a perceived wrong
  • b. to spy on citizens
  • c. to sell vulnerabilities to the highest bidder
  • d. fortune instead of fame

Questão 29

Questão
An example of ____ is not reveling they type of computer, operating system, software, and network connection a computer uses.
Responda
  • a. layering
  • b. diversity
  • c. obscurity
  • d. limiting

Questão 30

Questão
The ____ is primarily responsible for accessing, managing, and implementing security.
Responda
  • a. security administrator
  • b. security manager
  • c. security technician
  • d. chief information security officer (CISO)

Semelhante

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_09(11)
865 538
nsf_04(15)
865 538
nsf_05(4)
865 538
nsf_06(7)
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
Quem é Quem nas Teorias da Comunicação?
Ricardo Olimpio