Chapter 1 Flashcards
What information security position reports to the CISO and supervises technicians, administrators, and security staff?
A. Manager
B. Engineer
C. Auditor
D. Inspector
Manager
According to the U.S. Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade?
A) 10
B) 15
C) 22
D) 27
22
Which position below is considered an entry-level position for a person who has the necessary technical skills?
A) security technician
B) security administrator
C) CISO
D) security manager
security technician
What country is now the number one source of attack traffic?
A) India
B)Indonesia
C) China
D) Russia
Indonesia
What kind of server connects a remote system through the internet to local serial ports using TCP/IP?
A) Remote Access Server
B) VPN server
C) Serial server
D) HTTP server
Serial server
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
A) centered
B) local
C) remote
D) distributed
distributed
Which term below is frequently used to describe the tasks of securing information that is in a digital format?
A) network security
B) information security
C) physical security
D) logical security
information security
Which of the three protections ensures that only authorized parties can view information?
A) Security
B) Availability
C) Integrity
D) Confidentiality
Confidentiality
Select below the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
A) Availability
B) Confidentiality
C) Integrity
D) Identity
Integrity
The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?
A) Encryption
B) Authentication
C) Authorization
D) Accounting
Authentication
In information security, what constitutes a loss?
A) theft of information
B) a delay in transmitting information that results in a financial penalty
C) the loss of good will or a reputation
D) all of the above
All of the above
In information security, an example of a threat agent can be ____.
A) a force of nature such as a tornado that could destroy computer equipment
B) a virus that attacks a computer network
C) A person attempting to break into a secure computer network
D) All of the above
All of the above
What type of theft involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?
A) Cyberterrorism
B) Identity theft
C) Phishing
D) Scam
Identity theft
Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
A) HIPAA
B) HLPDA
C) HCPA
D) USHIPA
HIPAA
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
A) $100,000
B) $250,000
C) $500,000
D) $1,500,000
$1,500,000