Chapter 01 – Quiz Introduction to Security Flashcards

Questions 20

1
Q

Question # 01

Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question # 02

Smart phones give the owner of the device the ability to download security updates.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question # 03

As security is increased, convenience is often increased.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question # 04

To mitigate risk is the attempt to address risk by making the risk less serious.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question # 05

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question # 06

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?

a. unicorn
b. approved action
c. secure solution
d. silver bullet

A

d. silver bullet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question # 07

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?

a. centered
b. local
c. remote
d. distributed

A

d. distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question # 08

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

a. network security
b. information security
c. physical security
d. logical security

A

b. information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question # 09

Which of the following ensures that data is accessible to authorized users?

a. availability
b. confidentiality
c. integrity
d. identity

A

a. availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question # 10

In information security, what can constitute a loss?

a. theft of information
b. a delay in transmitting information that results in a financial penalty
c. the loss of good will or a reputation
d. all of the above

A

d. all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question # 11

What type of theft involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

a. cyberterrorism
b. identity theft
c. phishing
d. social scam

A

b. identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question # 12

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

a. HIPAA
b. HLPDA
c. HCPA
d. USHIPA

A

a. HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question # 13

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

a. cybercriminal
b. hacker
c. script kiddies
d. cyberterrorist

A

c. script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question # 14

Select the term that best describes automated attack software?

a. open-source utility
b. insider software
c. open-source intelligence
d. intrusion application

A

c. open-source intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question # 15

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?

a. Inside Attacks
b. Advanced Persistent Threat
c. Embedded Attacks
d. Modified Threat

A

b. Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question # 16

What term describes a layered security approach that provides the comprehensive protection?

a. comprehensive-security
b. diverse-defense
c. limiting-defense
d. defense-in-depth

A

d. defense-in-depth

17
Q

Question # 17

Which of the following is a valid fundamental security principle?

(Choose all that apply.)

a. signature
b. diversity
c. simplicity
d. layering

A

b. diversity
c. simplicity
d. layering

18
Q

Question # 18

Which of the following are considered threat actors?

(Choose all that apply.)

a. brokers
b. competitors
c. administrators
d. individuals

A

a. brokers

b. competitors

19
Q

Question # 19

What are the four different risk response techniques?

A

Accept, transfer, avoid, and mitigate.

20
Q

Question # 20

Describe the security principle of simplicity.

A

Because attacks can come from a variety of sources and in many ways, information security is by its very nature complex.

The more complex something becomes, the more difficult it is to understand.

In addition, complex systems allow many opportunities for something to go wrong.

Complex security systems can be hard to understand, troubleshoot, and feel secure about.

As much as possible, a secure system should be simple for those on the inside to understand and use.

Complex security schemes are often compromised to make them easier for trusted users to work with, yet this can also make it easier for the attackers.

In short, keeping a system simple from the inside but complex on the outside can sometimes be difficult but reaps a significant benefit.