Sie sind auf Seite 1von 6

Question 1

2.5 out of 2.5 points


The demand for IT professionals who know how to secure networks and comp
uters is at an all-time low.
Selected Answer:
False
Answers:
True
False
Question 2
2.5 out of 2.5 points
Recent employment trends indicate that employees with security certifica
tions are in high demand.
Selected Answer:
True
Answers:
True
False
Question 3
2.5 out of 2.5 points
Weakness
w software tools
Selected
Answers:
False

in software can be more quickly uncovered and exploited with ne


and techniques.
Answer:
True
True

Question 4
2.5 out of 2.5 points
An information security ____ position focuses on the administration and
management of plans, policies, and people.
Selected Answer:
c.
manager
Answers:
a.
auditor
b.
manager
c.
engineer
d.
inspector
Question 5
2.5 out of 2.5 points
A study by Foote Partners showed that security certifications earn emplo
yees ____ percent more pay than their uncertified counterparts.
Selected Answer:
a.
10 to 14
Answers:
a.
10 to 14
b.
12 to 15
c.
13 to 14
d.
14 to 16
Question 6

2.5 out of 2.5 points


The position of ____ is generally an entry-level position for a person w
ho has the necessary technical skills.
Selected Answer:
c.
security technician
Answers:
a.
CISO
b.
security technician
c.
security manager
d.
security administrator
Question 7
2.5 out of 2.5 points
____ attacks are responsible for half of all malware delivered by Web ad
vertising.
Selected Answer:
a.
Fake antivirus
Answers:
a.
Fake antivirus
b.
Canadian Pharmacy
c.
Melissa
d.
Slammer
Question 8
2.5 out of 2.5 points
Approximately ____ percent of households in the United States use the In
ternet for managing their finances.
Selected Answer:
c.
80
Answers:
a.
60
b.
70
c.
80
d.
90
Question 9
2.5 out of 2.5 points
In a ____ attack, attackers can attackers use hundreds or thousands of c
omputers in an attack against a single computer or network.
Selected Answer:
b.
distributed
Answers:
a.
remote
b.
centered
c.
distributed

d.
local
Question 10
2.5 out of 2.5 points
The term ____ is frequently used to describe the tasks of securing infor
mation that is in a digital format.
Selected Answer:
a.
information security
Answers:
a.
physical security
b.
network security
c.
logical security
d.
information security
Question 11
0 out of 2.5 points
____ ensures that only authorized parties can view information.
Selected Answer:
[None Given]
Answers:
a.
Confidentiality
b.
Availability
c.
Integrity
d.
Security
Question 12
0 out of 2.5 points
____ ensures that information is correct and that no unauthorized person
or malicious software has altered that data.
Selected Answer:
d.
Confidentiality
Answers:
a.
Confidentiality
b.
Identity
c.
Integrity
d.
Availability
Question 13
2.5 out of 2.5 points
____ ensures that the individual is who they claim to be (the authentic
or genuine person) and not an imposter.
Selected Answer:
b.
Authentication
Answers:
a.
Authorization
b.
Authentication

c.
Accounting
d.
Encryption
Question 14
2.5 out of 2.5 points
In information security, an example of a threat agent can be ____.
Selected Answer:
d.
both a and b
Answers:
a.
a force of nature such as a tornado that could destroy computer equipment
b.
a virus that attacks a computer network
c.
an unsecured computer network
d.
both a and b
Question 15
2.5 out of 2.5 points
Business ____ theft involves stealing proprietary business information s
uch as research for a new drug or a list of customers that competitors are eager
to acquire.
Selected Answer:
d.
data
Answers:
a.
identity
b.
record
c.
plan
d.
data
Question 16
2.5 out of 2.5 points
____ involves stealing another person s personal information, such as a So
cial Security number, and then using the information to impersonate the victim,
generally for financial gain.
Selected Answer:
b.
Identity theft
Answers:
a.
Cyberterrorism
b.
Identity theft
c.
Scam
d.
Phishing
Question 17
2.5 out of 2.5 points
Under the ____, health care enterprises must guard protected health info
rmation and implement policies and procedures to safeguard it, whether it be in
paper or electronic format.

Selected Answer:
HIPAA
Answers:
a.
HIPAA
b.
HCPA
c.
USHIPA
d.
HLPDA

a.

Question 18
2.5 out of 2.5 points
The ____ Act requires banks and financial institutions to alert customer
s of their policies and practices in disclosing customer information.
Selected Answer:
b.
Gramm-Leach-Bliley
Answers:
a.
Sarbanes-Oxley
b.
California Database Security Breach
c.
Gramm-Leach-Bliley
d.
USA Patriot
Question 19
2.5 out of 2.5 points
The single most expensive malicious attack was the 2000 ____, which cost
an estimated $8.7 billion.
Selected Answer:
c.
Love Bug
Answers:
a.
Code Red
b.
Nimda
c.
Love Bug
d.
Slammer
Question 20
2.5 out of 2.5 points
____ are a network of attackers, identity thieves, and financial fraudst
ers.
Selected Answer:
Cybercriminals
Answers:
a.
Hackers
b.
Cyberterrorists
c.
Cybercriminals
d.
Computer spies
Question 21

d.

2.5 out of 2.5 points


Targeted attacks against financial networks, unauthorized access to info
rmation, and the theft of personal information is sometimes known as ____.
Selected Answer:
c.
cybercrime
Answers:
a.
spam
b.
cyberterrorism
c.
cybercrime
d.
phishing

Das könnte Ihnen auch gefallen