Chapter 1: Intro to security: Review Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period? Inside Attacks Advanced Persistent Threat Modified Threat Embedded Attacks

Advanced Persistent Threat

Which tool is most commonly associated with nation state threat actors? Unlimited Harvest and Secure Attack (UHSA) Closed-Source Resistant and Recurrent Malware (CSRRM) Advanced Persistent Threat (APT) Network Spider and Worm Threat (NSAWT)

Advanced Persistent Threat (APT)

Question 9 1 / 1 pts What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments? Cyberterrorists Competitors Brokers Resource managers

Brokers

The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.

False

The Security Administrator reports directly to the CIO.

False

Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information? Sarbanes-Oxley Act (Sarbox) Health Insurance Portability and Accountability Act (HIPAA) Financial and Personal Services Disclosure Act Gramm-Leach- Bliley Act (GLBA)

Gramm-Leach- Bliley Act (GLBA)

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use? Diversity Layering Obscurity Limiting

Obscurity

A vulnerability is a flaw or weakness that allows a threat to bypass security.

True

One of the challenges in combating cyber terrorism is that many of the prime targets are not owned and managed by the federal government. True or False

True

The CompTIA Security+ certification is a vendor-neutral credential.

True

What is a race condition? When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences. When a software update is distributed prior to a vulnerability being discovered. When a vulnerability is discovered and there is a race to see if it can be patched before it is exploited by attackers. When an attack finishes its operation before antivirus can complete its work.

When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

In information security, what can constitute a loss? a delay in transmitting information that results in a financial penalty all of the above theft of information the loss of good will or a reputation

all of the above

What term describes a layered security approach that provides the comprehensive protection? diverse-defense limiting-defense defense-in-depth comprehensive-security

defense-in-depth

Which of the following is a valid fundamental security principle? (Choose all that apply.) diversity layering simplicity signature

diversity layering simplicity

Question 11 1 / 1 pts What information security position reports to the CISO and supervises technicians, administrators, and security staff? security engineer security administrator security auditor security manager

security manager


Set pelajaran terkait

Study Exam 2, Ch 12 (Evolve ch. 16, 18, 19)

View Set

Unit 2 Module 5 (Scientific Method, Case Study, Naturalistic Observation, Surveys, & Random Sampling)

View Set

Unit three, Chapter 15, AP Euro Quiz

View Set

Ms studies Unit 4 focus questions

View Set

Pharmacology: Chapter 55: Drugs Acting on the Lower Respiratory Tract

View Set

Nature and Environment 9 клас

View Set

Power Platform PL-900 Study Assessment

View Set

Computer Science: Data Structures and Algorithms

View Set