MCQExams
0:0:1
CBSE
JEE
NTSE
NEET
Practice
Homework
×
practice
Sec110_ Chapter 1 Quiz
In information security, what constitutes a loss?
Report Question
0%
theft of information,a delay in transmitting information that results in a financial penalty,the loss of good will or a reputation
0%
In information security, an example of a threat agent can be ____. A person attempting to break into a secure computer network,a virus that attacks a computer network,force of nature such as a tornado that could destroy computer equipment
0%
threat
0%
Integrity
The information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
Report Question
0%
Integrity
0%
manager
0%
Authentication
0%
Love Bug
The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?
Report Question
0%
Integrity
0%
Script kiddies
0%
Identity theft
0%
Authentication
Attacker who attacks for ideological reasons that are generally not as well defined as a cyberterrorist's motivation
Report Question
0%
hacktivist
0%
Gramm-Leach-Bliley
0%
HIPAA
0%
threat agent
Which term is frequently used to describe the tasks of securing information that is in a digital format?
Report Question
0%
Confidentiality
0%
Cybercriminals
0%
security technician
0%
information security
Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
Report Question
0%
HIPAA
0%
hacktivist
0%
Gramm-Leach-Bliley
0%
threat agent
What information security position reports to the CISO and supervises technicians, administrators, and security staff?
Report Question
0%
Cybercriminals
0%
False
0%
manager
0%
Serial server
What kind of server connects a remote system through the Internet to local serial ports using TCP/IP?
Report Question
0%
security technician
0%
Cybercriminals
0%
Serial server
0%
Script kiddies
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
Report Question
0%
HIPAA
0%
hacktivist
0%
threat agent
0%
Gramm-Leach-Bliley
A situation that involves exposure to danger
Report Question
0%
Risk
0%
threat
0%
asset
0%
True
According to the U.S. Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade?
Report Question
0%
cyberterrorism
0%
hacktivist
0%
22
0%
HIPAA
The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.
Report Question
0%
False
0%
Integrity
0%
True
0%
threat
Which position below is considered an entry-level position for a person who has the necessary technical skills?
Report Question
0%
Confidentiality
0%
Identity theft
0%
information security
0%
security technician
What country is now the number one source of attack traffic?
Report Question
0%
Serial server
0%
Confidentiality
0%
Cybercriminals
0%
Indonesia
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?
Report Question
0%
Integrity
0%
Exploit kit
0%
Love Bug
0%
Authentication
An item that has value.
Report Question
0%
asset
0%
threat
0%
manager
0%
False
Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.
Report Question
0%
distributed
0%
exploit kit
0%
True
0%
threat vector
In information security, an example of a threat agent can be ____.
Report Question
0%
Integrity
0%
In information security, an example of a threat agent can be ____. A person attempting to break into a secure computer network,a virus that attacks a computer network,force of nature such as a tornado that could destroy computer equipment
0%
information security
0%
theft of information,a delay in transmitting information that results in a financial penalty,the loss of good will or a reputation
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
Report Question
0%
threat vector
0%
exploit kit
0%
distributed
0%
$1,500,000
A flaw or weakness that allows a threat agent to bypass security
Report Question
0%
Indonesia
0%
vulnerability
0%
threat
0%
Confidentiality
A security administrator has both technical knowledge and managerial skills.True or False
Report Question
0%
threat
0%
False
0%
Risk
0%
True
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
Report Question
0%
True
0%
distributed
0%
exploit kit
0%
$1,500,000
A person or element that has the power to carry out a threat
Report Question
0%
HIPAA
0%
threat agent
0%
Gramm-Leach-Bliley
0%
hacktivist
0:0:1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
0
Answered
0
Not Answered
0
Not Visited
Correct : 0
Incorrect : 0
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqexams.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page