Exam 1: Introduction to Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a state sponsored attacker?​

(Essay)
4.8/5
(32)

List three of the federal and state laws that have been enacted to protect the privacy of electronic data.

(Essay)
4.8/5
(29)

What information security position reports to the CISO and supervises technicians, administrators, and security staff?

(Multiple Choice)
4.7/5
(35)

The demand for certified IT professionals who know how to secure networks and computers is at an all-time low.

(True/False)
4.9/5
(33)

In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?

(Multiple Choice)
4.9/5
(36)

According to the U.S. Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade?

(Multiple Choice)
4.7/5
(41)

What term is used to describe a loose network of attackers, identity thieves, and financial fraudsters?

(Multiple Choice)
4.9/5
(25)

Describe the security principle of simplicity.

(Essay)
4.9/5
(40)

Select below the term that is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so:

(Multiple Choice)
4.7/5
(34)

List and describe three of the characteristics of information that must be protected by information security?

(Essay)
4.9/5
(38)

What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

(Multiple Choice)
4.8/5
(42)

In information security, an example of a threat agent can be ____.

(Multiple Choice)
4.9/5
(41)

Information security is achieved through a combination of what three entities? Provide at least one example of each entity.

(Essay)
4.9/5
(37)

Match the following terms to the appropriate definitions. -A type of action that has the potential to cause harm.

(Multiple Choice)
4.8/5
(34)

Why is the speed of attacks making the challenge of keeping computers secure more difficult?

(Essay)
4.9/5
(28)

Select below the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

(Multiple Choice)
4.8/5
(34)

List and describe two of the four generally recognized security positions.

(Essay)
4.7/5
(31)

Match the following terms to the appropriate definitions. -A person or element that has the power to carry out a threat

(Multiple Choice)
4.8/5
(39)

Match the following terms to the appropriate definitions. -A premeditated, politically motivated attack against information, computer systems, computer programs, and data, which often results in violence.

(Multiple Choice)
4.7/5
(41)

In information security, what constitutes a loss?

(Multiple Choice)
4.9/5
(32)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)