Ch1 + Ch2 test
According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?
18
Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?
Gramm-leach-bailey
Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
HIPAA
What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?
Identity theft
Which term below is frequently used to describe the tasks of securing information that is in a digital format?
Information security
What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?
Logic bomb
What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?
Nation state actors
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?
SCRIPT KIDDIES
What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?
Social engineering
What process describes using technology as a basis for controlling the access and usage of sensitive data?
Technical controls
What type of system security malware allows for access to a computer, program, or service without authorization?
backdoor
Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
integrity
What social engineering principal frightens and coerces a victim by using threats?
intimidation
What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?
keylogger
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
macro
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
swiss cheese
What social engineering principal convinces a victim an immediate action is needed?
urgency
What type of malware is heavily dependent on a user in order to spread?
virus