Exam 1: Introduction to Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In information security,which of the following is an example of a threat actor?

(Multiple Choice)
4.7/5
(25)

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?

(Multiple Choice)
4.9/5
(26)

Select the term that best describes automated attack software?

(Multiple Choice)
4.9/5
(29)

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

(Multiple Choice)
4.9/5
(40)

Describe the security principle of simplicity.

(Essay)
4.9/5
(31)

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?

(Multiple Choice)
4.8/5
(36)

Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.

(True/False)
5.0/5
(27)

What type of theft involves stealing another person's personal information,such as a Social Security number,and then using the information to impersonate the victim,generally for financial gain?

(Multiple Choice)
4.9/5
(39)

What type of diversity is being implemented if a company is using multiple security products from different manufacturers?

(Multiple Choice)
4.9/5
(28)

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?

(Multiple Choice)
4.7/5
(37)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)