Beruflich Dokumente
Kultur Dokumente
Question 4
2.5 out of 2.5 points
An information security ____ position focuses on the administration and
management of plans, policies, and people.
Selected Answer:
c.
manager
Answers:
a.
auditor
b.
manager
c.
engineer
d.
inspector
Question 5
2.5 out of 2.5 points
A study by Foote Partners showed that security certifications earn emplo
yees ____ percent more pay than their uncertified counterparts.
Selected Answer:
a.
10 to 14
Answers:
a.
10 to 14
b.
12 to 15
c.
13 to 14
d.
14 to 16
Question 6
d.
local
Question 10
2.5 out of 2.5 points
The term ____ is frequently used to describe the tasks of securing infor
mation that is in a digital format.
Selected Answer:
a.
information security
Answers:
a.
physical security
b.
network security
c.
logical security
d.
information security
Question 11
0 out of 2.5 points
____ ensures that only authorized parties can view information.
Selected Answer:
[None Given]
Answers:
a.
Confidentiality
b.
Availability
c.
Integrity
d.
Security
Question 12
0 out of 2.5 points
____ ensures that information is correct and that no unauthorized person
or malicious software has altered that data.
Selected Answer:
d.
Confidentiality
Answers:
a.
Confidentiality
b.
Identity
c.
Integrity
d.
Availability
Question 13
2.5 out of 2.5 points
____ ensures that the individual is who they claim to be (the authentic
or genuine person) and not an imposter.
Selected Answer:
b.
Authentication
Answers:
a.
Authorization
b.
Authentication
c.
Accounting
d.
Encryption
Question 14
2.5 out of 2.5 points
In information security, an example of a threat agent can be ____.
Selected Answer:
d.
both a and b
Answers:
a.
a force of nature such as a tornado that could destroy computer equipment
b.
a virus that attacks a computer network
c.
an unsecured computer network
d.
both a and b
Question 15
2.5 out of 2.5 points
Business ____ theft involves stealing proprietary business information s
uch as research for a new drug or a list of customers that competitors are eager
to acquire.
Selected Answer:
d.
data
Answers:
a.
identity
b.
record
c.
plan
d.
data
Question 16
2.5 out of 2.5 points
____ involves stealing another person s personal information, such as a So
cial Security number, and then using the information to impersonate the victim,
generally for financial gain.
Selected Answer:
b.
Identity theft
Answers:
a.
Cyberterrorism
b.
Identity theft
c.
Scam
d.
Phishing
Question 17
2.5 out of 2.5 points
Under the ____, health care enterprises must guard protected health info
rmation and implement policies and procedures to safeguard it, whether it be in
paper or electronic format.
Selected Answer:
HIPAA
Answers:
a.
HIPAA
b.
HCPA
c.
USHIPA
d.
HLPDA
a.
Question 18
2.5 out of 2.5 points
The ____ Act requires banks and financial institutions to alert customer
s of their policies and practices in disclosing customer information.
Selected Answer:
b.
Gramm-Leach-Bliley
Answers:
a.
Sarbanes-Oxley
b.
California Database Security Breach
c.
Gramm-Leach-Bliley
d.
USA Patriot
Question 19
2.5 out of 2.5 points
The single most expensive malicious attack was the 2000 ____, which cost
an estimated $8.7 billion.
Selected Answer:
c.
Love Bug
Answers:
a.
Code Red
b.
Nimda
c.
Love Bug
d.
Slammer
Question 20
2.5 out of 2.5 points
____ are a network of attackers, identity thieves, and financial fraudst
ers.
Selected Answer:
Cybercriminals
Answers:
a.
Hackers
b.
Cyberterrorists
c.
Cybercriminals
d.
Computer spies
Question 21
d.