Exam 1: Introduction to Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What term best describes any premeditated,politically motivated attack against information,computer systems,computer programs,and data which results in violence against noncombatant targets by subnational groups or clandestine agents?
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
C
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
D
Which of the following ensures that data is accessible to authorized users?
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
A
Which of the following is a valid fundamental security principle? (Choose all that apply. )
(Multiple Choice)
4.9/5
(41)
To mitigate risk is the attempt to address risk by making the risk less serious.
(True/False)
4.7/5
(32)
Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?
(Multiple Choice)
4.8/5
(29)
Why is the speed of malicious attacks making the challenge of keeping computers secure more difficult?
(Essay)
4.8/5
(27)
Which of the following describes various supporting structures for implementing security that provides a resource of how to create a secure IT environment? (Choose all that apply. )
(Multiple Choice)
4.8/5
(34)
Which of the three protections ensures that only authorized parties can view information?
(Multiple Choice)
4.9/5
(40)
What threat actors are generally believed to be the most dangerous threat actors? Explain your answer.
(Essay)
5.0/5
(32)
Which of the following is a common security framework? (Choose all that apply. )
(Multiple Choice)
5.0/5
(32)
Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
(Multiple Choice)
4.8/5
(33)
What information security position reports to the CISO and supervises technicians,administrators,and security staff?
(Multiple Choice)
4.8/5
(36)
Which term below is frequently used to describe the tasks of securing information that is in a digital format?
(Multiple Choice)
4.9/5
(27)
What term describes a layered security approach that provides the comprehensive protection?
(Multiple Choice)
4.7/5
(32)
To date,the single most expensive malicious attack occurred in 2000,which cost an estimated $8.7 billion.What was the name of this attack?
(Multiple Choice)
4.8/5
(31)
The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.
(True/False)
4.7/5
(34)
What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?
(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)