Exam 1: Introduction to Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What term best describes any premeditated,politically motivated attack against information,computer systems,computer programs,and data which results in violence against noncombatant targets by subnational groups or clandestine agents?

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

Which of the following ensures that data is accessible to authorized users?

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

A

Which of the following is a valid fundamental security principle? (Choose all that apply. )

(Multiple Choice)
4.9/5
(41)

To mitigate risk is the attempt to address risk by making the risk less serious.

(True/False)
4.7/5
(32)

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

(Multiple Choice)
4.8/5
(29)

Why is the speed of malicious attacks making the challenge of keeping computers secure more difficult?

(Essay)
4.8/5
(27)

Which of the following describes various supporting structures for implementing security that provides a resource of how to create a secure IT environment? (Choose all that apply. )

(Multiple Choice)
4.8/5
(34)

What are script kiddies?

(Essay)
4.7/5
(41)

Which of the three protections ensures that only authorized parties can view information?

(Multiple Choice)
4.9/5
(40)

What threat actors are generally believed to be the most dangerous threat actors? Explain your answer.

(Essay)
5.0/5
(32)

Which of the following is a common security framework? (Choose all that apply. )

(Multiple Choice)
5.0/5
(32)

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

(Multiple Choice)
4.8/5
(33)

What information security position reports to the CISO and supervises technicians,administrators,and security staff?

(Multiple Choice)
4.8/5
(36)

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

(Multiple Choice)
4.9/5
(27)

What term describes a layered security approach that provides the comprehensive protection?

(Multiple Choice)
4.7/5
(32)

To date,the single most expensive malicious attack occurred in 2000,which cost an estimated $8.7 billion.What was the name of this attack?

(Multiple Choice)
4.8/5
(31)

As security is increased,convenience is often increased.

(True/False)
4.9/5
(36)

The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.

(True/False)
4.7/5
(34)

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)