Exam 1: Introduction to Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following terms to the appropriate definitions. -Automated attack package that can be used without an advanced knowledge of computers

(Multiple Choice)
4.7/5
(32)

Match the following terms to the appropriate definitions. -A situation that involves exposure to danger

(Multiple Choice)
4.9/5
(31)

Script kiddies acquire which item below from other attackers to easily craft an attack:

(Multiple Choice)
4.8/5
(30)

The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

(Multiple Choice)
4.8/5
(29)

An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission. Match the following terms to the appropriate definitions. a.asset b.cyberterrorism c.hactivist d.exploit kit e.computer spy

(Short Answer)
5.0/5
(39)

Why are there delays in updating products such as anti-virus to resist attacks?

(Essay)
4.7/5
(36)

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?

(Multiple Choice)
4.7/5
(29)

Security is the goal to be free from danger as well as the process that achieves that freedom.

(True/False)
4.8/5
(31)

Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

(Multiple Choice)
4.8/5
(28)

Which position below is considered an entry-level position for a person who has the necessary technical skills?

(Multiple Choice)
4.8/5
(22)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)