Security Awareness ch 1 quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

From January 2005 through July 2015, approximately how many electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers?

853 million

How do attackers today make it difficult to distinguish an attack from legitimate traffic?

How do attackers today make it difficult to distinguish an attack from legitimate traffic?

the goal to be free from danger as well as the process that achieves that freedom

threat agent

What is a flaw or weakness that allows a threat agent to bypass security?

vulnerability

There is a straightforward and easy solution to securing computers.

False

Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information are sometimes known as ____________________.

cybercrime

What does the FBI define as any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents?"

cyberterrorism

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as which of the following?

cyberterrorists

Information contained on devices is protected by three layers: Two of the layers are products and policies and procedures. What is the third

products, people, & policy and procedures

Which phrase best describes security?

the goal to be free from danger as well as the process that achieves that freedom

Which of the following is a type of action that has the potential to cause harm?

threat

Where are you most likely to find a PKES system?

Automobile

Which of the following is NOT a factor that contributes to difficulties faced in defending against attacks?

Enhanced encryption algorithms

In a well-run information security program, attacks will never get through security perimeters and local defenses.

False

Script kiddies typically have advanced knowledge of computers and networks.

False

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

GLBA

Which of the following involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

Identity theft

What term is frequently used to describe the tasks of securing information that is in a digital format?

Information Security

Which of the following ensures that information is correct and no unauthorized person or malicious software has altered it?

Integrity

Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.

True

Today, many attack tools are freely available and do not require any technical knowledge to use.

True

Security is ____ convenience.

inversely proportional to

It is vital to have ____________________ security on all of the personal computers to defend against any attack that breaches the perimeter.

local


संबंधित स्टडी सेट्स

Practice Questions: Seizures & Epilepsy

View Set

Nursing Fundamentals Practice Final Exam EXTRA STUDY

View Set

Media Law Final: Access and Protecting Sources

View Set

ATP Chapter 2 Branch Circuits & Feeders

View Set

Unit 4: Elimination Adaptive ATI Quiz

View Set

WONDERLIC TEST THINGS YOU SHOULD KNOW

View Set

ACCTG 101. Chapter 3, Smart learning

View Set

Solving for Angle Measures of Right Triangles Assignment

View Set

Exercise 42 : The Human Skeletal System

View Set

GL19 U7 (PowerPoint) CH02 Concepts Exam

View Set