chapter 1 intro to security Flashcards

1
Q

attacker who would break into a computer system without the owners permission and publicly disclose the vulnerabilities?

A

gray hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

why can brokers command such a high price for what they sell?

A

the vulneralbility was perviously unknown and is unlikely to be patched quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which phrase describes the term “security” in a general sense?

A

necessary steps to protect a person or property from harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

——— ensures that only authorized parties can view the information?

A

confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a person that has the power to carry out a threat?

A

threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

——– ensures that individuals are who they claim to be.

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the difference between a activist and a cyberterrorist?

A

hactivist is not to incite panic like cyberterrorist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?

A

health insurance portability and accountability act (HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

why do cyberterrorist target power plants, air traffic control centers, and water systems?

A

they can cause significant disruption by destroying a few targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

first step of a cyber kill chain

A

reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an organization the purchased security products from different vendors is demonstrating which security principle?

A

diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are attackers called who belong to a network of identity thieves and financial fraudsters?

A

cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is an objective of state-sponsored attackers?

A

to spy on citizens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an example of——— is not revealing the type of computer, operating system, software, and network connection a computer uses.

A

obscurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the ——— is primarily responsible for assessing, managing, and implementing security.

A

chief information security officer (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly