Exam 1: Introduction to Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What process describes using technology as a basis for controlling the access and usage of sensitive data?

(Multiple Choice)
4.7/5
(36)

Which of the following are considered threat actors? (Choose all that apply. )

(Multiple Choice)
4.7/5
(36)

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

(Multiple Choice)
4.8/5
(40)

What term is used to describe a group that is strongly motivated by ideology,but is usually not considered to be well-defined and well-organized?

(Multiple Choice)
4.8/5
(42)

Smart phones give the owner of the device the ability to download security updates.

(True/False)
4.9/5
(34)

The Security Administrator reports directly to the CIO.

(True/False)
4.8/5
(32)

Information security is achieved through a combination of what three entities? Provide at least one example of each entity.

(Essay)
4.7/5
(32)

What is the Payment Card Industry Data Security Standard (PCI DSS)?

(Essay)
4.8/5
(37)

Why are there delays in updating products such as anti-virus software to resist attacks?

(Essay)
4.8/5
(38)

What are the four different risk response techniques?

(Short Answer)
4.9/5
(41)

Brokers steal new product research or a list of current customers to gain a competitive advantage.

(True/False)
4.9/5
(39)

List and describe three of the characteristics of information that must be protected by information security?

(Essay)
4.8/5
(33)

What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?

(Essay)
5.0/5
(27)

A vulnerability is a flaw or weakness that allows a threat to bypass security.

(True/False)
4.9/5
(32)

The CompTIA Security+ certification is a vendor-neutral credential.

(True/False)
4.9/5
(33)

According to the U.S.Bureau of Labor Statistics,what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?

(Multiple Choice)
4.9/5
(32)

Which position below is considered an entry-level position for a person who has the necessary technical skills?

(Multiple Choice)
4.8/5
(44)

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.

(True/False)
4.7/5
(36)

What level of security access should a computer user have to do their job?

(Multiple Choice)
4.8/5
(31)

In information security,what can constitute a loss?

(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)