Sec+ Chpt 1 Homework Questions
What are the goals of inforamtion security?
-maintain productivity -prevent data theft -avoid legal consequences
What is considered a loss in Information Security?
-theft of information -a delay in transmitting information that results in a financial penalty -the loss of good will or a reputation
What ensures that only authorized parties can view information?
Confidentiality
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as _________.
Cybercrime
_____ are a loose-knit network of attackers, identity thieves, and financial fraudsters.
Cybercriminals
Which of the following is NOT a basic defense against attacks? A)layering B)diversity C)obscurity D)complexity
D)complexity (supposed to be Simplicity)
Which of the following was used to describe attackers who would break into a computer system w/o the owner's permission & publicly disclose the vulnerability? A)white hat hackers B)black hat hackers C)blue hat hackers D)gray hat hackers
D)gray hat hackers
Which of the following is NOT a characteristic of an Advanced Persistant Threat (APT)? A)can spam seceral yeats B)targets proprietary info C)uses advanced tools and techniques D)is only used by hactivists against foreign enemies
D)is only used by hactivists against foreign enemies
Business ______ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Data
In a ____ attack, attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
In a company of 500 employees, it is estimated that _____ employees would be required to combat a virus attack to restore productivity.
Five
What is the Healthcare enterprise that must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format?
HIPAA
This involves using someones personal information, such as social security numbers, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.
Identity Theft
What ensures that info is correct and that no unauthorized person or malicious software has altered the data?
Integrity
The single most expensive attack was the 2000 ____, which cost an estimated $8.7 billion.
Love Bug
A security _______ focuses on the administration and management of plans, policies, and people.
Manager
What is the set of security standards that all companies who process, store, or transmit credit card info must follow?
Payment Card Industry Data Security Standard (PCI DSS)
What is another name for unsolicited e-mail messages?
SPAM
What is created to help fight corporate fraud. it creates very strict financial reporting requirements on all companies that have stock?
Sarbanes-Oxley
_______ are attackers who are supported by governments for launching computer attacks against their foes.
State-sponsored Attackers
What is a force of nature such as a tornado that could destroy computer equipment; a virus that attacks a computer network
Threat Agent in Information Security
While most attacks take advantage of vulnerabilities that someone has already uncovered, a ________ occurs when an attacker discovers and exploits a previously unknown flaw.
Zero Day