ITN 260 Chapter 1 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which tool is most commonly associated with nation state threat actors? Closed-Source Resistant and Recurrent Malware (CSRRM) Advanced Persistent Threat (APT) Network Spider and Worm Threat (NSAWT) Unlimited Harvest and Secure Attack (UHSA)

Advanced Persistent Threat (APT)

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments? Brokers Cyberterrorists Competitors Resource managers

Brokers

Which of the following ensures that only authorized parties can view protected information? Availability Confidentiality Integrity Authorization

Confidentiality

An organization that practices purchasing products from different vendors is demonstrating which security principle? Diversity Layering Obscurity Limiting

Diversity

Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document? Transfer risk Extinguish risk Mitigate risk Avoid risk

Extinguish risk

Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information? Health Insurance Portability and Accountability Act (HIPAA) Gramm-Leach-Bliley Act (GLBA) Financial and Personal Services Disclosure Act Sarbanes-Oxley Act (Sarbox)

Gramm-Leach-Bliley Act (GLBA)

Which the following is NOT a reason why it is difficult to defend against today's attackers? Delays in security updating Increased speed of attacks Simplicity of attack tools Greater sophistication of defense tools

Greater sophistication of defense tools

Which of the following is an enterprise critical asset? Information Servers, routers, and power supplies System software Outsourced computing services

Information

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation? Large number of vulnerabilities Misconfigurations\ End-of-life systems Lack of vendor support

Misconfigurations

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use? Layering Diversity Obscurity Limiting

Obscurity

Which of the following is NOT a successive layer in which information security is achieved? Purposes Products Procedures People

Purposes

What are industry-standard frameworks and reference architectures that are required by external agencies known as? Required Compulsory Mandatory Regulatory

Regulatory

Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered? Security manager Security technician Security administrator Security officer

Security administrator

Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use? Security and convenience are not related. Convenience always outweighs security. Whenever security and convenience intersect, security always wins. Security and convenience are inversely proportional.

Security and convenience are inversely proportional.

Which of the following is NOT true regarding security? Security is a goal. Security is a war that must be won at all costs. Security is a process. Security includes the necessary steps to protect from harm.

Security is a war that must be won at all costs.

Why do cyberterrorists target power plants, air traffic control centers, and water systems? These targets are government-regulated and any successful attack would be considered a major victory. The targets are privately owned and cannot afford high levels of security. These targets have notoriously weak security and are easy to penetrate. They can cause significant disruption by destroying only a few targets.

They can cause significant disruption by destroying only a few targets.

What is an objective of state-sponsored attackers? To amass fortune over of fame To spy on citizens To sell vulnerabilities to the highest bidder To right a perceived wrong

To spy on citizens

Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT be covered? Misconfigurations Default configurations Weak configurations Vulnerable business processes

Vulnerable business processes

What is a race condition? When an attack finishes its operation before antivirus can complete its work. When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences. When a software update is distributed prior to a vulnerability being discovered. When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers.

When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____. using both open-sourced as well as supplier-sourced hardware and software that interacts appropriately with limited resources through a long-term process that results in ultimate security on electronic digital devices and limited analog devices that can connect via the Internet or through a local area network through products, people, and procedures on the devices that store, manipulate, and transmit the information

through products, people, and procedures on the devices that store, manipulate, and transmit the information


Conjuntos de estudio relacionados

18 Components of Project Management Plan-- From Which Process?

View Set

injury, management and recovery test 4

View Set

*HURST REVIEW Qbank/Customize Quiz - Pharmacology

View Set

Human Development Chapter 6 Study Guide

View Set

US History 8: The Development of Colonial America: Mastery Test

View Set