Exam 1: Introduction to Security
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Match the following terms to the appropriate definitions.
-Automated attack package that can be used without an advanced knowledge of computers
(Multiple Choice)
4.7/5
(32)
Match the following terms to the appropriate definitions.
-A situation that involves exposure to danger
(Multiple Choice)
4.9/5
(31)
Script kiddies acquire which item below from other attackers to easily craft an attack:
(Multiple Choice)
4.8/5
(30)
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
(Multiple Choice)
4.8/5
(29)
An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission.
Match the following terms to the appropriate definitions.
a.asset
b.cyberterrorism
c.hactivist
d.exploit kit
e.computer spy
(Short Answer)
5.0/5
(39)
Why are there delays in updating products such as anti-virus to resist attacks?
(Essay)
4.7/5
(36)
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
(Multiple Choice)
4.7/5
(29)
Security is the goal to be free from danger as well as the process that achieves that freedom.
(True/False)
4.8/5
(31)
Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
(Multiple Choice)
4.8/5
(28)
Which position below is considered an entry-level position for a person who has the necessary technical skills?
(Multiple Choice)
4.8/5
(22)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)