Chapter 1 Flashcards

1
Q

What information security position reports to the CISO and supervises technicians, administrators, and security staff?

A. Manager
B. Engineer
C. Auditor
D. Inspector

A

Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to the U.S. Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade?

A) 10
B) 15
C) 22
D) 27

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which position below is considered an entry-level position for a person who has the necessary technical skills?

A) security technician
B) security administrator
C) CISO
D) security manager

A

security technician

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What country is now the number one source of attack traffic?

A) India
B)Indonesia
C) China
D) Russia

A

Indonesia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of server connects a remote system through the internet to local serial ports using TCP/IP?

A) Remote Access Server
B) VPN server
C) Serial server
D) HTTP server

A

Serial server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?

A) centered
B) local
C) remote
D) distributed

A

distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

A) network security
B) information security
C) physical security
D) logical security

A

information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the three protections ensures that only authorized parties can view information?

A) Security
B) Availability
C) Integrity
D) Confidentiality

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Select below the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

A) Availability
B) Confidentiality
C) Integrity
D) Identity

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?

A) Encryption
B) Authentication
C) Authorization
D) Accounting

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In information security, what constitutes a loss?

A) theft of information
B) a delay in transmitting information that results in a financial penalty
C) the loss of good will or a reputation
D) all of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In information security, an example of a threat agent can be ____.

A) a force of nature such as a tornado that could destroy computer equipment
B) a virus that attacks a computer network
C) A person attempting to break into a secure computer network
D) All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of theft involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

A) Cyberterrorism
B) Identity theft
C) Phishing
D) Scam

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

A) HIPAA
B) HLPDA
C) HCPA
D) USHIPA

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?

A) $100,000
B) $250,000
C) $500,000
D) $1,500,000

A

$1,500,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The _____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

A) Gramm-Leach-Bliley
B) Sarbanes-Oxley
C) California Database Security Breach

A

Gramm-Leach-Bliley

17
Q

To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?

A) Nimda
B) Slammer
C) Love Bug
D) Code Red

A

Love Bug

18
Q

What term is used to describe a loose network of attackers, identity thieves, and financial fraudsters?

A) Cybercriminals
B) Cyberterrorists
C) Computer spies
D) Hackers

A

Cybercriminals

19
Q

Select below the term that is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so:

A) Cybercriminal
B) Hacker
C) Script kiddies
D) Cyberterrorist

A

Script kiddies

20
Q

Script kiddies acquire which term below from other attackers to easily craft an attack:

A) Exploit kit
B) Botnet
C) Zero day
D) Backdoor

A

Exploit kit