Exam 1: Introduction to Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Discuss why delays in patching are making information security more difficult.

(Essay)
4.8/5
(33)

A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.

(Multiple Choice)
4.7/5
(30)

Under the ____, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

(Multiple Choice)
4.9/5
(33)

What is another name for unsolicited e-mail messages?

(Multiple Choice)
4.8/5
(31)

Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.

(True/False)
4.9/5
(40)

List three of the federal and state laws that have been enacted to protect the privacy of electronic data.

(Essay)
4.8/5
(31)

The position of ____ is generally an entry-level position for a person who has the necessary technical skills.

(Multiple Choice)
4.8/5
(30)

Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.

(Multiple Choice)
4.9/5
(37)

____________________ provides tracking of events.

(Short Answer)
4.9/5
(37)

____ involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.

(Multiple Choice)
4.8/5
(40)

_________________________ is focused on protecting the valuable electronic information of organizations and users.

(Short Answer)
4.9/5
(35)

____ ensures that information is correct and that no unauthorized person or malicious software has altered that data.

(Multiple Choice)
5.0/5
(37)

In a general sense, assurance may be defined as the necessary steps to protect a person or property from harm.

(True/False)
4.9/5
(25)

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

(Multiple Choice)
4.9/5
(27)

An information security ____ position focuses on the administration and management of plans, policies, and people.

(Multiple Choice)
4.8/5
(38)

Describe script kiddies.

(Essay)
4.8/5
(38)

____ are a loose-knit network of attackers, identity thieves, and financial fraudsters.

(Multiple Choice)
4.9/5
(24)

Describe the security principle of simplicity.

(Essay)
4.9/5
(47)

What is the maximum fine for those who wrongfully disclose individually identifiable health information with the intent to sell it?

(Multiple Choice)
4.8/5
(35)

An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission.

(Short Answer)
4.8/5
(31)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)