Exam 1: Introduction to Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
List three of the federal and state laws that have been enacted to protect the privacy of electronic data.
(Essay)
4.8/5
(29)
What information security position reports to the CISO and supervises technicians, administrators, and security staff?
(Multiple Choice)
4.7/5
(35)
The demand for certified IT professionals who know how to secure networks and computers is at an all-time low.
(True/False)
4.9/5
(33)
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
(Multiple Choice)
4.9/5
(36)
According to the U.S. Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade?
(Multiple Choice)
4.7/5
(41)
What term is used to describe a loose network of attackers, identity thieves, and financial fraudsters?
(Multiple Choice)
4.9/5
(25)
Select below the term that is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so:
(Multiple Choice)
4.7/5
(34)
List and describe three of the characteristics of information that must be protected by information security?
(Essay)
4.9/5
(38)
What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?
(Multiple Choice)
4.8/5
(42)
In information security, an example of a threat agent can be ____.
(Multiple Choice)
4.9/5
(41)
Information security is achieved through a combination of what three entities? Provide at least one example of each entity.
(Essay)
4.9/5
(37)
Match the following terms to the appropriate definitions.
-A type of action that has the potential to cause harm.
(Multiple Choice)
4.8/5
(34)
Why is the speed of attacks making the challenge of keeping computers secure more difficult?
(Essay)
4.9/5
(28)
Select below the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
(Multiple Choice)
4.8/5
(34)
List and describe two of the four generally recognized security positions.
(Essay)
4.7/5
(31)
Match the following terms to the appropriate definitions.
-A person or element that has the power to carry out a threat
(Multiple Choice)
4.8/5
(39)
Match the following terms to the appropriate definitions.
-A premeditated, politically motivated attack against information, computer systems, computer programs, and data, which often results in violence.
(Multiple Choice)
4.7/5
(41)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)