Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
which of the following is NOT a characteristic of Advanced Persistent Threat (APT)? |
is the only used by hactivists against foriegn enemies
|
|
Which of the following was used to describe attackers who would break into a computer system without the owner's permission and publicy disclose the vulnerabilities? |
gray hat hackers
|
|
Which of the following is NOT a reason why it is difficult to defend against the vulnerability? |
greater sophistication of defense tools
|
|
Which of the following is NOT a reason why it is difficult to defend against todays' attackers? |
greater sophistication of defense tools |
|
Why can brokers command such a high price for what they sell? |
the vulnerability was previously unknown and is unlikely to be patched quickly
|
|
Which phrase describes the term "security" in a general sense? |
the necessary steps to protect a person or property from harm |
|
_______ ensures that only authorized parties can view the information |
confidentiality |
|
what is a person or element that has the power to carry out a threat? |
threat agent |
|
____ ensures that individuals are who they claim to be. |
authentication |
|
what is the difference between a hactivist and a cyberterrorist? |
the aim of a hactivisit is not to incite panic like cyberterrorists. |
|
each of the following is a goal of information security EXCEPT |
limit access control |
|
which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it? |
Health Insurance Portability and Accountability Act (HIPAA) |
|
why do cyberterrorists target power plants, air traffic control centers, and water systems? |
they can cause significant disruption by destroying only a few targets. |
|
what is the first step in the Cyber Kill Chain? |
reconnaissance |
|
an organization that purchased security procedures from different vendors is demonstrating which security principles? |
diversity |
|
each of the following can be classified as an "insider" EXCEPT |
stockholders |
|
what are attackers called who belong to a network of identity theives and financial fruadsters? |
cybercriminals |
|
what is an objective of state-sponsored attackers? |
to spy on citizens |
|
an example of _________ is not revealing the type of computer, operating system, software, and network connection a computer uses. |
obscurity |
|
the _______ is primarily responsible for assessing, managing, and implementing security . |
chief information security officer (CISO) |