• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?

is the only used by hactivists against foriegn enemies

Which of the following was used to describe attackers who would break into a computer system without the owner's permission and publicy disclose the vulnerabilities?

gray hat hackers

Which of the following is NOT a reason why it is difficult to defend against the vulnerability?

greater sophistication of defense tools

Which of the following is NOT a reason why it is difficult to defend against todays' attackers?

greater sophistication of defense tools

Why can brokers command such a high price for what they sell?

the vulnerability was previously unknown and is unlikely to be patched quickly

Which phrase describes the term "security" in a general sense?

the necessary steps to protect a person or property from harm

_______ ensures that only authorized parties can view the information

confidentiality

what is a person or element that has the power to carry out a threat?

threat agent

____ ensures that individuals are who they claim to be.

authentication

what is the difference between a hactivist and a cyberterrorist?

the aim of a hactivisit is not to incite panic like cyberterrorists.

each of the following is a goal of information security EXCEPT

limit access control

which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?

Health Insurance Portability and Accountability Act (HIPAA)

why do cyberterrorists target power plants, air traffic control centers, and water systems?

they can cause significant disruption by destroying only a few targets.

what is the first step in the Cyber Kill Chain?

reconnaissance

an organization that purchased security procedures from different vendors is demonstrating which security principles?

diversity

each of the following can be classified as an "insider" EXCEPT

stockholders

what are attackers called who belong to a network of identity theives and financial fruadsters?

cybercriminals

what is an objective of state-sponsored attackers?

to spy on citizens

an example of _________ is not revealing the type of computer, operating system, software, and network connection a computer uses.

obscurity

the _______ is primarily responsible for assessing, managing, and implementing security .

chief information security officer (CISO)