Information System Security Chapter 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the three protections ensures that only authorized parties can view information? a. confidentiality b. availability c. security d. integrity

a. confidentiality

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it? a. silver bullet b. unicorn c. approved action d. secure solution

a. silver bullet

What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents? a. cybercriminal b. cyberterrorism c. cracking d. hacking

b. cyberterrorism

Which term below is frequently used to describe the tasks of securing information that is in a digital format? a. network security b. info security c. logical security d. physical security

b. info security

According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024? a. 27 b. 10 c. 18 d. 15

c. 18

Which of the following ensures that data is accessible to authorized users? a. integrity b. identify c. availability d. confidentiality

c. availability

What level of security access should a computer user have to do their job? a. limiting amount b. authorized access c. least amount d. password protected

c. least amount

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? a. $50,000 b. $250,000 c. $500,000 d. $1,500,000

d. $1,500,000

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information? a. Sarbanes Oxley b. USA Patriot c. California Database Security Breach d. Gramm-Leach-Bliley

d. Gramm-Leach-Bliley

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes? a. nation state threats b. state hackers c. cyber military d. nation state actors

d. nation state actors


Ensembles d'études connexes

Pathophysiology Practice Questions Chapter 1: Concepts of Health and Disease

View Set

Ch. 13 - Performing Forensic Analysis and Techniques

View Set

Medical Terminology Chapters 8, 9

View Set

Chapter 6: Making Sense of Statistical Significance

View Set

WHAP: All Through The End of Time Period 2 (1.1-4.7)

View Set

Chapter 21: 21.2 Progressive Presidents

View Set

Combo with "2nd half of Intro to American Politics Key terms and concepts" and 1 other

View Set

2.1 rates of change and tangent lines to curves

View Set

Discrete Mathematics 1.4 Predicates and Quantifiers

View Set

NUR 3465 Developing Family Peds Chapter 26: Growth and Development of the Toddler

View Set