In information security, what constitutes a loss?
  • theft of information,a delay in transmitting information that results in a financial penalty,the loss of good will or a reputation
  • In information security, an example of a threat agent can be ____. A person attempting to break into a secure computer network,a virus that attacks a computer network,force of nature such as a tornado that could destroy computer equipment
  • threat
  • Integrity
The information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
  • Integrity
  • manager
  • Authentication
  • Love Bug
The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?
  • Integrity
  • Script kiddies
  • Identity theft
  • Authentication
Attacker who attacks for ideological reasons that are generally not as well defined as a cyberterrorist's motivation
  • hacktivist
  • Gramm-Leach-Bliley
  • HIPAA
  • threat agent
Which term is frequently used to describe the tasks of securing information that is in a digital format?
  • Confidentiality
  • Cybercriminals
  • security technician
  • information security
Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
  • HIPAA
  • hacktivist
  • Gramm-Leach-Bliley
  • threat agent
What information security position reports to the CISO and supervises technicians, administrators, and security staff?
  • Cybercriminals
  • False
  • manager
  • Serial server
What kind of server connects a remote system through the Internet to local serial ports using TCP/IP?
  • security technician
  • Cybercriminals
  • Serial server
  • Script kiddies
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
  • HIPAA
  • hacktivist
  • threat agent
  • Gramm-Leach-Bliley
A situation that involves exposure to danger
  • Risk
  • threat
  • asset
  • True
According to the U.S. Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade?
  • cyberterrorism
  • hacktivist
  • 22
  • HIPAA
The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.
  • False
  • Integrity
  • True
  • threat
Which position below is considered an entry-level position for a person who has the necessary technical skills?
  • Confidentiality
  • Identity theft
  • information security
  • security technician
What country is now the number one source of attack traffic?
  • Serial server
  • Confidentiality
  • Cybercriminals
  • Indonesia
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?
  • Integrity
  • Exploit kit
  • Love Bug
  • Authentication
An item that has value.
  • asset
  • threat
  • manager
  • False
Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.
  • distributed
  • exploit kit
  • True
  • threat vector
In information security, an example of a threat agent can be ____.
  • Integrity
  • In information security, an example of a threat agent can be ____. A person attempting to break into a secure computer network,a virus that attacks a computer network,force of nature such as a tornado that could destroy computer equipment
  • information security
  • theft of information,a delay in transmitting information that results in a financial penalty,the loss of good will or a reputation
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
  • threat vector
  • exploit kit
  • distributed
  • $1,500,000
A flaw or weakness that allows a threat agent to bypass security
  • Indonesia
  • vulnerability
  • threat
  • Confidentiality
A security administrator has both technical knowledge and managerial skills.True or False
  • threat
  • False
  • Risk
  • True
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
  • True
  • distributed
  • exploit kit
  • $1,500,000
A person or element that has the power to carry out a threat
  • HIPAA
  • threat agent
  • Gramm-Leach-Bliley
  • hacktivist
0:0:1



Answered

Not Answered

Not Visited
Correct : 0
Incorrect : 0