Sec+ Chpt 1 Homework Questions

Ace your homework & exams now with Quizwiz!

What are the goals of inforamtion security?

-maintain productivity -prevent data theft -avoid legal consequences

What is considered a loss in Information Security?

-theft of information -a delay in transmitting information that results in a financial penalty -the loss of good will or a reputation

What ensures that only authorized parties can view information?

Confidentiality

Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as _________.

Cybercrime

_____ are a loose-knit network of attackers, identity thieves, and financial fraudsters.

Cybercriminals

Which of the following is NOT a basic defense against attacks? A)layering B)diversity C)obscurity D)complexity

D)complexity (supposed to be Simplicity)

Which of the following was used to describe attackers who would break into a computer system w/o the owner's permission & publicly disclose the vulnerability? A)white hat hackers B)black hat hackers C)blue hat hackers D)gray hat hackers

D)gray hat hackers

Which of the following is NOT a characteristic of an Advanced Persistant Threat (APT)? A)can spam seceral yeats B)targets proprietary info C)uses advanced tools and techniques D)is only used by hactivists against foreign enemies

D)is only used by hactivists against foreign enemies

Business ______ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.

Data

In a ____ attack, attackers use hundreds or thousands of computers in an attack against a single computer or network.

Distributed

In a company of 500 employees, it is estimated that _____ employees would be required to combat a virus attack to restore productivity.

Five

What is the Healthcare enterprise that must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format?

HIPAA

This involves using someones personal information, such as social security numbers, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating.

Identity Theft

What ensures that info is correct and that no unauthorized person or malicious software has altered the data?

Integrity

The single most expensive attack was the 2000 ____, which cost an estimated $8.7 billion.

Love Bug

A security _______ focuses on the administration and management of plans, policies, and people.

Manager

What is the set of security standards that all companies who process, store, or transmit credit card info must follow?

Payment Card Industry Data Security Standard (PCI DSS)

What is another name for unsolicited e-mail messages?

SPAM

What is created to help fight corporate fraud. it creates very strict financial reporting requirements on all companies that have stock?

Sarbanes-Oxley

_______ are attackers who are supported by governments for launching computer attacks against their foes.

State-sponsored Attackers

What is a force of nature such as a tornado that could destroy computer equipment; a virus that attacks a computer network

Threat Agent in Information Security

While most attacks take advantage of vulnerabilities that someone has already uncovered, a ________ occurs when an attacker discovers and exploits a previously unknown flaw.

Zero Day


Related study sets

RN Learning System Nursing Care of Children Practice Quiz 2

View Set

Direct Objects, Indirect Objects, Objective Complement, Predicate Nominatives, Predicate Adjectives Adjective Phrases, and Adverb Phrases

View Set

WHICH/ WHO / WHOSE / WHERE /WHEN

View Set

All about Pi (not really all about) 3.1415926535897932384626433...

View Set

Abnormal Psych: Eating and Sleeping Disorders

View Set