Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
The Security administrator reports directly to the CIO |
False |
|
False |
Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses. |
|
False |
Smart phones give the owner of the device the ability to download security updates. |
|
The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information. |
False |
|
According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024? |
18 |
|
Which position below is considered an entry-level position for a person who has the necessary technical skills? |
Security technician |
|
What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it? |
Silver Bullet |
|
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network? |
Distributed |
|
Which of the three protections ensures that only authorized parties can view information? |
Confidentiality |
|
Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data. |
Integrity |
|
Which of the following ensures that data is accessible to authorized users? |
Availability |
|
In information security, what can constitute a loss? |
All of the above |
|
In information security, which of the following is an example of a threat actor? |
All of the above |
|
What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain? |
Identity theft |
|
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? |
$1.5M |
|
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack? |
Love Bug |
|
What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized? |
Hacktivist |
|
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so? |
Script Kiddies |
|
What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes? |
Nation State Actors |
|
What term describes a layered security approach that provides the comprehensive protection? |
Defense-in-depth |
|
What process describes using technology as a basis for controlling the access and usage of sensitive data? |
Technical controls |
|
What type of diversity is being implemented if a company is using multiple security products from different manufacturers? |
Vendor diversity |
|
Brokers steal new product research or a list of current customers to gain a competitive advantage. |
False |