Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
A(n) ____ is a type of action that has the potential to cause harm.
a. | threat agent | c. | threat | b. | asset | d. | vulnerability |
|
|
2.
|
Attackers today use common Internet ____ and applications to perform attacks,
making it difficult to distinguish an attack from legitimate traffic.
a. | interfaces | c. | protocols | b. | scripting | d. | languages |
|
|
3.
|
It is important that action be taken in advance in order to ____________. This
may involve keeping back up copies of important data stored in a safe place.
a. | stay ahead of the game | c. | minimize loses | b. | play it safe | d. | defend yourself |
|
|
4.
|
The term ____ is frequently used to describe the tasks of securing information
that is in a digital format.
a. | information security | c. | network security | b. | information assurance | d. | information
warfare |
|
|
5.
|
A(n) ____ is a person or element that has the power to carry out a
threat.
a. | attack agent | c. | threat agent | b. | risk | d. | vulnerability |
|
|
6.
|
____ ensures that information is correct and no unauthorized person or malicious
software has altered that data.
a. | Availability | c. | Protection | b. | Confidentiality | d. | Integrity |
|
|
7.
|
A computer ____ is a person who has been hired to break into a computer and
steal information.
a. | mole | c. | hacker | b. | worm | d. | spy |
|
|
8.
|
____ ensures that data is accessible when needed to authorized users.
a. | Availability | c. | Confidentiality | b. | Non-repudiation | d. | Integrity |
|
|
9.
|
The FBI defines ____ as any “premeditated, politically motivated attack
against information, computer systems, computer programs, and data which results in violence against
non-combatant targets by sub-national groups or clandestine agents.”
a. | information warfare | c. | eTerrorism | b. | cyberware | d. | cyberterrorism |
|
|
10.
|
____ are individuals who want to attack computers yet they lack the knowledge of
computers and networks needed to do so.
a. | Hackers | c. | Crackers | b. | Script kiddies | d. | Elites |
|
|
11.
|
From January 2005 through July 2012, over ____ electronic data records in the
United States were breached, exposing to attackers a range of personal electronic data, such as
address, Social Security numbers, health records, and credit card numbers.
a. | 456,000 | c. | 562 million | b. | 22 million | d. | 660 billion |
|
|
12.
|
On average it takes ____ days for a victim to recover from an attack.
a. | three | c. | eight | b. | five | d. | ten |
|
|
13.
|
A(n) ____ is a flaw or weakness that allows a threat agent to bypass
security.
a. | threat | c. | threat agent | b. | vulnerability | d. | asset |
|
|
14.
|
____ involves stealing another person’s personal information, such as a
Social Security number, and then using the information to impersonate the victim, generally for
financial gain.
a. | Identity theft | c. | Cyberterrorism | b. | White hat hacking | d. | Digital fraud |
|
|
15.
|
Keeping _______ copies of important data stored in
a safe place is an example of implementing update defenses within a practical security
strategy.
a. | recent | c. | several | b. | back up | d. | only digital |
|
|
16.
|
Terrorists who turn their attacks to the network and computer infrastructure to
cause panic among citizens are known as ____.
a. | cyberterrorists | c. | hackers | b. | spies | d. | hacktivists |
|
|
17.
|
In the past, the term ____ was commonly used to refer to a person who uses
advanced computer skills to attack computers.
a. | black-hat | c. | hacker | b. | white-hat | d. | slacker |
|
|
18.
|
“____” involves breaking into a car’s electronic
system.
a. | Joyriding | c. | Car riding | b. | Car hijack | d. | Car hacking |
|
|
19.
|
Information (contained on the devices) is protected by three layers: products,
____, and policies and procedures.
a. | applications | c. | people | b. | systems | d. | tools |
|
|
20.
|
Under____, healthcare enterprises must guard protected health information and
implement policies and procedures to safeguard it, whether it be in paper or electronic
format.
a. | COPPA | c. | GLBA | b. | Sarbox | d. | HIPAA |
|
Matching Match the following descriptions of ways to best defend
against attacks.
|
|
|
a. | Minimize losses | c. | Block attacks | b. | Update defenses | d. | Send secure
information |
|
|
1.
|
Local security
|
|
2.
|
Update hardware and software
|
|
3.
|
Keep backup copies of important documents
|
|
4.
|
Scramble data, make sure you are sending over a secure link
|