Filters
Question type

Study Flashcards

In information security,what can constitute a loss?


A) theft of information
B) a delay in transmitting information that results in a financial penalty
C) the loss of good will or a reputation
D) all of the above

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What are the four different risk response techniques?

Correct Answer

verifed

verified

Accept,tra...

View Answer

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?


A) HIPAA
B) HLPDA
C) HCPA
D) USHIPA

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What process describes using technology as a basis for controlling the access and usage of sensitive data?


A) technical controls
B) administrative controls
C) control diversity
D) vendor diversity

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following are considered threat actors? (Choose all that apply. )


A) brokers
B) competitors
C) administrators
D) individuals

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

The Security Administrator reports directly to the CIO.

A) True
B) False

Correct Answer

verifed

verified

What is the Payment Card Industry Data Security Standard (PCI DSS)?

Correct Answer

verifed

verified

The PCI DSS is a set of security standar...

View Answer

What term is used to describe a group that is strongly motivated by ideology,but is usually not considered to be well-defined and well-organized?


A) hactivists
B) hacker
C) script kiddies
D) cyberterrorist

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Brokers steal new product research or a list of current customers to gain a competitive advantage.

A) True
B) False

Correct Answer

verifed

verified

What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?

Correct Answer

verifed

verified

Vulnerable business processes,...

View Answer

List and describe three of the characteristics of information that must be protected by information security?

Correct Answer

verifed

verified

Three of the characteristics of informat...

View Answer

Which position below is considered an entry-level position for a person who has the necessary technical skills?


A) security technician
B) security administrator
C) CISO
D) security manager

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A vulnerability is a flaw or weakness that allows a threat to bypass security.

A) True
B) False

Correct Answer

verifed

verified

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.

A) True
B) False

Correct Answer

verifed

verified

According to the U.S.Bureau of Labor Statistics,what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?


A) 10
B) 15
C) 18
D) 27

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What level of security access should a computer user have to do their job?


A) password protected
B) least amount
C) limiting amount
D) authorized access

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Why are there delays in updating products such as anti-virus software to resist attacks?

Correct Answer

verifed

verified

At the current rate of submiss...

View Answer

Information security is achieved through a combination of what three entities? Provide at least one example of each entity.

Correct Answer

verifed

verified

Products (physical security): The physic...

View Answer

The CompTIA Security+ certification is a vendor-neutral credential.

A) True
B) False

Correct Answer

verifed

verified

Smart phones give the owner of the device the ability to download security updates.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer