Security Quiz 1

Ace your homework & exams now with Quizwiz!

7. Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use?

"Security and convenience are inversely proportional."

20. What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?

Brokers

12. Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?

Extinguish Risk

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?

Misconfigurations

19. What are industry-standard frameworks and reference architectures that are required by external agencies known as?

Regulatory

6. Which of the following is NOT true regarding security?

Security is a war that must be won at all costs. focused more on the process instead of the goal

4. What is a race condition?

When two concurrent threads of executions access a shared resource simultaneously, resulting in unintended consequences.

10. Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information (blank)

through products, people, and procedures on the devices that store, manipulate, and transmit the information

15. Which tool is most commonly associated with nation state threat actors?

Advanced Persistent Threat (APT)

8. Which of the following ensures that only authorized parties can view protected information?

Confidentiality

16. An organization that practices purchasing products from different vendors is demonstrating which security principle?

Diversity

13. Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information?

Gramm-Leach-Bliley Act (GLBA)

5. Which the following is NOT a reason why it is difficult to defend against today's attackers?

Greater sophistication of defense tools

11. Which of the following is an enterprise critical asset?

Information Extremely difficult to replace

18. Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use?

Obscurity

9. Which of the following is NOT a successive layer in which information security is achieved?

Purposes

Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered?

Security administrator

14. Why do cyberterrorists target power plants, air traffic control centers, and water systems?

They can cause significant disruption by destroying only a few targets.

17. What is an objective of state-sponsored attackers?

To spy on citizens

3. Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT covered?

Vulnerable business processes


Related study sets

IS 101 - TMCC - TECHNOLOGY IN ACTION - CHAPTER 12 QUIZ

View Set

Unit One: Basic Economic Concepts

View Set

Nurs 107 PrepU Chapter 49 Management of Patients with Urinary Disorders

View Set

Information Systems 300 CHAPTER 10

View Set

Chapter 57: Care of Patients with Inflammatory Intestinal Disorders

View Set

OSHA-10 Emergency Action Plans and Fire Protection

View Set