Exam 1: Introduction to Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why is the speed of attacks making the challenge of keeping computers secure more difficult?

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

With modern tools at their disposal, attackers can quickly scan systems to find weaknesses and launch attacks with unprecedented speed. Many tools can even initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.

In information security, an example of a threat agent can be ____.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.

Free
(True/False)
4.9/5
(42)
Correct Answer:
Verified

True

The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

(Multiple Choice)
4.8/5
(41)

Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as ____.

(Multiple Choice)
4.9/5
(44)

Information security is achieved through a combination of what three entities? Provide at least one example of each entity.

(Essay)
4.8/5
(27)

Recent employment trends indicate that employees with security certifications are in high demand.

(True/False)
4.8/5
(38)

What is a hacker?

(Essay)
4.8/5
(38)

Security ____________________ have both technical knowledge and managerial skills and analyze and design security solutions within a specific entity.

(Short Answer)
4.8/5
(32)

List and describe two of the four generally recognized security positions.

(Essay)
4.7/5
(34)

In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.

(Multiple Choice)
4.7/5
(27)

In information security, a loss can be ____.

(Multiple Choice)
4.8/5
(43)

In a general sense, ____________________ may be defined as the necessary steps to protect a person or property from harm.

(Short Answer)
4.9/5
(43)
Match the following terms to the appropriate definitions.
a person who has been hired to break into a computer and steal information
asset
intended to cause panic, provoke violence, or result in a financial catastrophe
risk
an event or action that might defeat security measures in place and result in a loss
exploit
Correct Answer:
Verified
Premises:
Responses:
a person who has been hired to break into a computer and steal information
asset
intended to cause panic, provoke violence, or result in a financial catastrophe
risk
an event or action that might defeat security measures in place and result in a loss
exploit
plans and policies established by an organization to ensure that people correctly use the products
procedures
a weakness that allows a threat agent to bypass security
threat agent
the likelihood that a threat agent will exploit a vulnerability
threat
something that has value
vulnerability
to take advantage of a vulnerability
computer spy
a person or thing that has the power to carry out a threat
cyberterrorism
(Matching)
4.7/5
(36)

The demand for IT professionals who know how to secure networks and computers is at an all-time low.

(True/False)
4.9/5
(27)

Briefly describe computer spies.

(Essay)
4.8/5
(36)

____ ensures that only authorized parties can view information.

(Multiple Choice)
4.8/5
(33)

Approximately ____ percent of households in the United States use the Internet for managing their finances.

(Multiple Choice)
4.7/5
(35)

____ attacks are responsible for half of all malware delivered by Web advertising.

(Multiple Choice)
4.9/5
(38)

The single most expensive malicious attack was the 2000 ____, which cost an estimated $8.7 billion.

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)