Exam 1: Introduction to Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A security administrator has both technical ​knowledge and managerial skills.

Free
(True/False)
4.7/5
(26)
Correct Answer:
Verified

True

Which of the three protections ensures that only authorized parties can view information?

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

D

Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

True

An _______________ is a type of threat that can come from employees, contractors, and business partners, such as a disgruntled worker.​

(Short Answer)
4.9/5
(26)

Match the following terms to the appropriate definitions. -The means by which an attack could occur​

(Multiple Choice)
4.9/5
(35)

Describe script kiddies.

(Essay)
4.8/5
(40)

To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?

(Multiple Choice)
4.9/5
(33)

Match the following terms to the appropriate definitions. -An item that has value.

(Multiple Choice)
4.8/5
(31)

Match the following terms to the appropriate definitions. -A flaw or weakness that allows a threat agent to bypass security

(Multiple Choice)
5.0/5
(39)

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

(Multiple Choice)
4.9/5
(32)

Match the following terms to the appropriate definitions. -Attacker who attacks for ideological reasons that are generally not as well defined as a cyberterrorist's motivation

(Multiple Choice)
5.0/5
(35)

The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.

(True/False)
4.8/5
(39)

What kind of server connects a remote system through the Internet to local serial ports using TCP/IP?

(Multiple Choice)
4.9/5
(42)

____________________ provides tracking of events.

(Short Answer)
4.8/5
(30)

What is a hacker?

(Essay)
4.8/5
(46)

What country is now the number one source of attack traffic?

(Multiple Choice)
4.9/5
(43)

The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?

(Multiple Choice)
4.8/5
(37)

Match the following terms to the appropriate definitions. -​Automated attack package that can be used without an advanced knowledge of computers

(Multiple Choice)
4.8/5
(39)

The ___________________ reports directly to the chief information officer (CIO), and is responsible for assessing, managing, and implementing security.

(Short Answer)
4.8/5
(30)

Proper ________________ involves identifying risks but making the decision to not engage in the activity.​

(Short Answer)
4.8/5
(36)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)