Exam 1: Introduction to Security
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
Why is the speed of attacks making the challenge of keeping computers secure more difficult?
Free
(Essay)
4.8/5
(38)
Correct Answer:
With modern tools at their disposal, attackers can quickly scan systems to find weaknesses and launch attacks with unprecedented speed. Many tools can even initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.
In information security, an example of a threat agent can be ____.
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.
Free
(True/False)
4.9/5
(42)
Correct Answer:
True
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
(Multiple Choice)
4.8/5
(41)
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as ____.
(Multiple Choice)
4.9/5
(44)
Information security is achieved through a combination of what three entities? Provide at least one example of each entity.
(Essay)
4.8/5
(27)
Recent employment trends indicate that employees with security certifications are in high demand.
(True/False)
4.8/5
(38)
Security ____________________ have both technical knowledge and managerial skills and analyze and design security solutions within a specific entity.
(Short Answer)
4.8/5
(32)
List and describe two of the four generally recognized security positions.
(Essay)
4.7/5
(34)
In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
(Multiple Choice)
4.7/5
(27)
In a general sense, ____________________ may be defined as the necessary steps to protect a person or property from harm.
(Short Answer)
4.9/5
(43)
Match the following terms to the appropriate definitions.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(36)
The demand for IT professionals who know how to secure networks and computers is at an all-time low.
(True/False)
4.9/5
(27)
____ ensures that only authorized parties can view information.
(Multiple Choice)
4.8/5
(33)
Approximately ____ percent of households in the United States use the Internet for managing their finances.
(Multiple Choice)
4.7/5
(35)
____ attacks are responsible for half of all malware delivered by Web advertising.
(Multiple Choice)
4.9/5
(38)
The single most expensive malicious attack was the 2000 ____, which cost an estimated $8.7 billion.
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)