Deck 1: Introduction to Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 1: Introduction to Security
1
In a general sense, assurance may be defined as the necessary steps to protect a person or property from harm.
False
2
____ involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.
A) Cyberterrorism
B) Identity theft
C) Phishing
D) Scam
A) Cyberterrorism
B) Identity theft
C) Phishing
D) Scam
B
3
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
True
4
In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
A) centered
B) local
C) remote
D) distributed
A) centered
B) local
C) remote
D) distributed
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The position of ____ is generally an entry-level position for a person who has the necessary technical skills.
A) security technician
B) security administrator
C) CISO
D) security manager
A) security technician
B) security administrator
C) CISO
D) security manager
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
A) Encryption
B) Authentication
C) Authorization
D) Accounting
A) Encryption
B) Authentication
C) Authorization
D) Accounting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Approximately ____ percent of households in the United States use the Internet for managing their finances.
A) 60
B) 70
C) 80
D) 90
A) 60
B) 70
C) 80
D) 90
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Recent employment trends indicate that employees with security certifications are in high demand.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
In information security, a loss can be ____.
A) theft of information
B) a delay in transmitting information that results in a financial penalty
C) the loss of good will or a reputation
D) all of the above
A) theft of information
B) a delay in transmitting information that results in a financial penalty
C) the loss of good will or a reputation
D) all of the above
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ ensures that information is correct and that no unauthorized person or malicious software has altered that data.
A) Availability
B) Confidentiality
C) Integrity
D) Identity
A) Availability
B) Confidentiality
C) Integrity
D) Identity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ attacks are responsible for half of all malware delivered by Web advertising.
A) "Canadian Pharmacy"
B) Fake antivirus
C) Melissa
D) Slammer
A) "Canadian Pharmacy"
B) Fake antivirus
C) Melissa
D) Slammer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Under the ____, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
A) HIPAA
B) HLPDA
C) HCPA
D) USHIPA
A) HIPAA
B) HLPDA
C) HCPA
D) USHIPA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ ensures that only authorized parties can view information.
A) Security
B) Availability
C) Integrity
D) Confidentiality
A) Security
B) Availability
C) Integrity
D) Confidentiality
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The demand for IT professionals who know how to secure networks and computers is at an all-time low.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
An information security ____ position focuses on the administration and management of plans, policies, and people.
A) manager
B) engineer
C) auditor
D) inspector
A) manager
B) engineer
C) auditor
D) inspector
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
A) network security
B) information security
C) physical security
D) logical security
A) network security
B) information security
C) physical security
D) logical security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In information security, an example of a threat agent can be ____.
A) a force of nature such as a tornado that could destroy computer equipment
B) a virus that attacks a computer network
C) an unsecured computer network
D) both a and b
A) a force of nature such as a tornado that could destroy computer equipment
B) a virus that attacks a computer network
C) an unsecured computer network
D) both a and b
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.
A) 10 to 14
B) 12 to 15
C) 13 to 14
D) 14 to 16
A) 10 to 14
B) 12 to 15
C) 13 to 14
D) 14 to 16
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
A) identity
B) data
C) plan
D) record
A) identity
B) data
C) plan
D) record
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Why is the speed of attacks making the challenge of keeping computers secure more difficult?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What is another name for unsolicited e-mail messages?
A) spam
B) spawn
C) trash
D) scam
A) spam
B) spawn
C) trash
D) scam
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
In a general sense, ____________________ may be defined as the necessary steps to protect a person or property from harm.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The single most expensive malicious attack was the 2000 ____, which cost an estimated $8.7 billion.
A) Nimda
B) Slammer
C) Love Bug
D) Code Red
A) Nimda
B) Slammer
C) Love Bug
D) Code Red
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
____ are a loose-knit network of attackers, identity thieves, and financial fraudsters.
A) Cybercriminals
B) Cyberterrorists
C) Computer spies
D) Hackers
A) Cybercriminals
B) Cyberterrorists
C) Computer spies
D) Hackers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____________________ provides tracking of events.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
List and describe three of the characteristics of information that must be protected by information security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Discuss why delays in patching are making information security more difficult.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Security ____________________ have both technical knowledge and managerial skills and analyze and design security solutions within a specific entity.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Information security is achieved through a combination of what three entities? Provide at least one example of each entity.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What is a hacker?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
A) Gramm-Leach-Bliley
B) Sarbanes-Oxley
C) California Database Security Breach
D) USA Patriot
A) Gramm-Leach-Bliley
B) Sarbanes-Oxley
C) California Database Security Breach
D) USA Patriot
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
List and describe two of the four generally recognized security positions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What is the maximum fine for those who wrongfully disclose individually identifiable health information with the intent to sell it?
A) $100,000
B) $250,000
C) $500,000
D) $1,000,000
A) $100,000
B) $250,000
C) $500,000
D) $1,000,000
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Describe script kiddies.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
List three of the federal and state laws that have been enacted to protect the privacy of electronic data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
_________________________ is focused on protecting the valuable electronic information of organizations and users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as ____.
A) spam
B) phishing
C) cybercrime
D) cyberterrorism
A) spam
B) phishing
C) cybercrime
D) cyberterrorism
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Briefly describe computer spies.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the security principle of simplicity.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck