Chapter 1 Flashcards
Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs. Which of these generally recognized security positions has Ian been offered?
Security Administrator
Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT covered?
Default configurations
What is a race condition?
occurs when two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.
Which of the following is NOT true regarding security?
Security is a war that must be won at all costs.
Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use?
“Security and convenience are inversely proportional.”
Which of the following ensures that only authorized parties can view protected information?
Availability
Which of the following is NOT a successive layer in which information security is achieved?
Purposes
Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information .
through products, people, and procedures on the devices that store, manipulate, and transmit the information.
Which of the following is an enterprise critical asset?
Information
Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?
a. Extinguish risk
b. Transfer risk
c. Mitigate risk
d. Avoid risk
Extinguish risk
Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information?
a. Sarbanes-Oxley Act (Sarbox)
b. Financial and Personal Services Disclosure Act
c. Health Insurance Portability and Accountability Act (HIPAA)
d. Gramm-Leach-Bliley Act (GLBA)
d. Gramm-Leach-Bliley Act (GLBA)
Why do cyberterrorists target power plants, air traffic control centers, and water systems?
They can cause significant disruption by destroying only a few targets.
Which tool is most commonly associated with nation state threat actors?
Closed-Source Resistant and Recurrent Malware (CSRRM)
Advanced Persistent Threat (APT)
Unlimited Harvest and Secure Attack (UHSA)
Network Spider and Worm Threat (NSAWT)
An organization that practices purchasing products from different vendors is demonstrating which security principle?
Diversity
What is an objective of state-sponsored attackers?
To right a perceived wrong
To amass fortune over of fame
To spy on citizens
To sell vulnerabilities to the highest bidder