• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back

The Security administrator reports directly to the CIO

False

False

Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.

False

Smart phones give the owner of the device the ability to download security updates.

The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.

False

According to the U.S. Bureau of Labor Statistics, what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?

18

Which position below is considered an entry-level position for a person who has the necessary technical skills?

Security technician

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?

Silver Bullet

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?

Distributed

Which of the three protections ensures that only authorized parties can view information?

Confidentiality

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

Integrity

Which of the following ensures that data is accessible to authorized users?

Availability

In information security, what can constitute a loss?

All of the above

In information security, which of the following is an example of a threat actor?

All of the above

What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

Identity theft

Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?

$1.5M

To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?

Love Bug

What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?

Hacktivist

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

Script Kiddies

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?

Nation State Actors

What term describes a layered security approach that provides the comprehensive protection?

Defense-in-depth

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Technical controls

What type of diversity is being implemented if a company is using multiple security products from different manufacturers?

Vendor diversity

Brokers steal new product research or a list of current customers to gain a competitive advantage.

False