CTS 1120 Chapter 1

Ace your homework & exams now with Quizwiz!

According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?

18

Brokers steal new product research or a list of current customers to gain a competitive advantage.

False

The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.

False

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.

True

To mitigate risk is the attempt to address risk by making the risk less serious.

True

What term describes a layered security approach that provides the comprehensive protection?

defense-in-depth

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?

distributed

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

information security

Select the term that best describes automated attack software?

open-source intelligence

Which of the following describes various supporting structures for implementing security that provides a resource of how to create a secure IT environment? (Choose all that apply.)

reference architectures, industry-standard frameworks

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?

1,500,000

Which of the following is a common security framework? (Choose all that apply.)

ISO, COBIT, RFC

In information security, which of the following is an example of a threat actor?

all of the above

Which of the following ensures that data is accessible to authorized users?

availability

Which of the following are considered threat actors? (Choose all that apply.)

brokers, competitors

What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

identity theft

What level of security access should a computer user have to do their job?

least amount

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?

nation state actors

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

script kiddies

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?

silver bullet


Related study sets

Substance Use Disorders Diagnosis

View Set

Atome/molecule/intrant extrant/mélange/shema de principe/shema de construction/ tableau périodique/ changement

View Set

physics chapter 1 lecture assignment, physics chapter 2/3 lecture assignment, physics chapter 2/3 lecture quiz, Chapter 4 Lecture Assignment

View Set

MODULE 10: Ch. 42 (Fluid & Electrolytes) - FLUID BALANCE

View Set

Chapter 61: Management of Patients with Neurologic Dysfunction

View Set