Ch1 + Ch2 test

¡Supera tus tareas y exámenes ahora con Quizwiz!

According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?

18

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

Gramm-leach-bailey

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

HIPAA

What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

Identity theft

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

Information security

What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?

Logic bomb

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?

Nation state actors

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

SCRIPT KIDDIES

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?

Social engineering

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Technical controls

What type of system security malware allows for access to a computer, program, or service without authorization?

backdoor

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

integrity

What social engineering principal frightens and coerces a victim by using threats?

intimidation

What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?

keylogger

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

macro

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?

swiss cheese

What social engineering principal convinces a victim an immediate action is needed?

urgency

What type of malware is heavily dependent on a user in order to spread?

virus


Conjuntos de estudio relacionados

Theology - Chapter 7 - Resurrection and Ascension of Jesus Christ

View Set

Chapter 17: Government and Politics

View Set