Chapter 1: Intro to security: Review Questions
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period? Inside Attacks Advanced Persistent Threat Modified Threat Embedded Attacks
Advanced Persistent Threat
Which tool is most commonly associated with nation state threat actors? Unlimited Harvest and Secure Attack (UHSA) Closed-Source Resistant and Recurrent Malware (CSRRM) Advanced Persistent Threat (APT) Network Spider and Worm Threat (NSAWT)
Advanced Persistent Threat (APT)
Question 9 1 / 1 pts What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments? Cyberterrorists Competitors Brokers Resource managers
Brokers
The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.
False
The Security Administrator reports directly to the CIO.
False
Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information? Sarbanes-Oxley Act (Sarbox) Health Insurance Portability and Accountability Act (HIPAA) Financial and Personal Services Disclosure Act Gramm-Leach- Bliley Act (GLBA)
Gramm-Leach- Bliley Act (GLBA)
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use? Diversity Layering Obscurity Limiting
Obscurity
A vulnerability is a flaw or weakness that allows a threat to bypass security.
True
One of the challenges in combating cyber terrorism is that many of the prime targets are not owned and managed by the federal government. True or False
True
The CompTIA Security+ certification is a vendor-neutral credential.
True
What is a race condition? When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences. When a software update is distributed prior to a vulnerability being discovered. When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers. When an attack finishes its operation before antivirus can complete its work.
When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.
In information security, what can constitute a loss? a delay in transmitting information that results in a financial penalty all of the above theft of information the loss of good will or a reputation
all of the above
What term describes a layered security approach that provides the comprehensive protection? diverse-defense limiting-defense defense-in-depth comprehensive-security
defense-in-depth
Which of the following is a valid fundamental security principle? (Choose all that apply.) diversity layering simplicity signature
diversity layering simplicity
Question 11 1 / 1 pts What information security position reports to the CISO and supervises technicians, administrators, and security staff? security engineer security administrator security auditor security manager
security manager