Question 1
Question
The single most expensive malicious attack was the 2000 __, which cost an estimated $8.7 billion.
Answer
-
a. Love Bug
-
b. Nimda
-
c. Slammer
-
d. Code Red
Question 2
Question
The __ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
Question 3
Question
Under the __, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
Answer
-
a. HLPDA
-
b. USHIPA
-
c. HIPAA
-
d. HCPA
Question 4
Question
What is another name for unsolicited e-mail messages?
Answer
-
a. trash
-
b. scam
-
c. spawn
-
d. spam
Question 5
Question
__ ensures that information is correct and that no unauthorized person or malicious software has altered that data
Answer
-
a. Identity
-
b. Confidentiality
-
c. Integrity
-
d. Availability
Question 6
Question
__ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
Answer
-
a. Encryption
-
b. Authentication
-
c. Accounting
-
d. Authorization
Question 7
Question
A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.
Answer
-
a. 10 to 14
-
b. 14 to 16
-
c. 12 to 15
-
d. 13 to 14
Question 8
Question
In information security, an example of a threat agent can be ____.
Answer
-
a. a force of nature such as a tornado that could destroy computer equipment
-
b. a virus that attacks a computer network
-
c. Both a and d
-
d. an unsecured computer network
Question 9
Question
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
Question 10
Question
The demand for IT professionals who know how to secure networks and computers is at an all-time low.
Question 11
Question
Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?
Answer
-
a. can span several years
-
b. targets sensitive propriety information
-
c. uses advanced tools and techniques
-
d. is only used by hactivists against foreign enemies
Question 12
Question
Which of the following was used to describe attackers who would break into a computer system without the owner's permission and publicly disclose the vulnerability?
Answer
-
a. white hat hackers
-
b. black hat hackers
-
c. blue hat hackers
-
d. gray hat hackers
Question 13
Question
Which of the following is NOT a reason why it is difficult to defend against today's attackers?
Answer
-
a. increased speed of attacks
-
b. simplicity of attack tools
-
c. greater sophistication of defense tools
-
d. delays in security updating
Question 14
Question
Why can brokers command such a high price for what they sell?
Answer
-
a. Brokers are licensed professionals.
-
b. The attack targets are always wealthy corporations.
-
c. The vulnerability was previously unknown and is unlikely to be patched quickly.
-
d. Brokers work in teams and all the members must be compensated.
Question 15
Question
Which phrase describes the term "security" in a general sense.
Answer
-
a. protection from only direct actions
-
b. using reverse attack vectors (RAV) for protection
-
c. only available on hardened computers and systems
-
d. the necessary steps to protect a person or property from harm
Question 16
Question
____ ensures that only authorized parties can view the information.
Answer
-
a. Confidentiality
-
b. Availability
-
c. Authorization
-
d. Integrity
Question 17
Question
Each of the following is a successive layer in which information security is achieved EXCEPT ____.
Answer
-
a. products
-
b. purposes
-
c. procedures
-
d. people
Question 18
Question
What is a person or element that has the power to carry out a threat.
Answer
-
a. threat agent
-
b. exploiter
-
c. risk agent
-
d. vulnerability
Question 19
Question
____ ensures that individuals are why they claim to be.
Answer
-
a. Demonstration
-
b. Accounting
-
c. Authentication
-
d. Certification
Question 20
Question
What is the difference between a hactivist and a cyberterrorist?
Answer
-
a. A hactivist is motivated by ideology while a cyberterrorist is not.
-
b. Cyberterrorists always work in groups while hactivists work alone.
-
c. The aim of a hactivist is not to incite panic like cyberterrorists.
-
d. Cyberterrorists are better funded than hactivists.
Question 21
Question
Each of the following is a goal of information security EXCEPT ____.
Question 22
Question
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
Answer
-
a. Hospital Protection and Insurance Association Agreement (HPIAA)
-
b. Sarbanes-Oxley (Sarbox)
-
c. Gramm-Leach-Bliley Act (GLBA)
-
d. Health Insurance Portability and Accountability Act (HIPAA)
Question 23
Question
Why do cyberterrorists target power plants, air traffic control centers, and water systems?
Answer
-
a. These targets have notoriously weak security and are easy to penetrate.
-
b. They can cause significant disruption by destroying only a few targets.
-
c. These targets are government-regulated and any successful attack would be considered a major victory.
-
d. The targets are privately owned and cannot afford high levels of security.
Question 24
Question
What is the first step in the Cyber Kill Chain?
Answer
-
a. weaponization
-
b. exploitation
-
c. actions on objectives
-
d. reconnaissance
Question 25
Question
An organization that purchased security products from different vendors is demonstrating which security principle?
Answer
-
a. obscurity
-
b. diversity
-
c. limiting
-
d. layering
Question 26
Question
Each of the following can be classified an "insider" EXCEPT ____.
Answer
-
a. business partners
-
b. contractors
-
c. stockholders
-
d. employees
Question 27
Question
What are attackers called who belong to a network of identity thieves and financial fraudsters?
Answer
-
a. cybercriminals
-
b. script kiddies
-
c. hackers
-
d. brokers
Question 28
Question
What is an objective of state-sponsored attackers?
Answer
-
a. to right a perceived wrong
-
b. to spy on citizens
-
c. to sell vulnerabilities to the highest bidder
-
d. fortune instead of fame
Question 29
Question
An example of ____ is not reveling they type of computer, operating system, software, and network connection a computer uses.
Answer
-
a. layering
-
b. diversity
-
c. obscurity
-
d. limiting
Question 30
Question
The ____ is primarily responsible for accessing, managing, and implementing security.