Name:     ID: 
 
Email: 

Chapter 1 - Information Security

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

A(n) ____ is a type of action that has the potential to cause harm.
a.
threat agent
c.
threat
b.
asset
d.
vulnerability
 

 2. 

Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.
a.
interfaces
c.
protocols
b.
scripting
d.
languages
 

 3. 

It is important that action be taken in advance in order to ____________. This may involve keeping back up copies of important data stored in a safe place.
a.
stay ahead of the game
c.
minimize loses
b.
play it safe
d.
defend yourself
 

 4. 

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
a.
information security
c.
network security
b.
information assurance
d.
information warfare
 

 5. 

A(n) ____ is a person or element that has the power to carry out a threat.
a.
attack agent
c.
threat agent
b.
risk
d.
vulnerability
 

 6. 

____ ensures that information is correct and no unauthorized person or malicious software has altered that data.
a.
Availability
c.
Protection
b.
Confidentiality
d.
Integrity
 

 7. 

A computer ____ is a person who has been hired to break into a computer and steal information.
a.
mole
c.
hacker
b.
worm
d.
spy
 

 8. 

____ ensures that data is accessible when needed to authorized users.
a.
Availability
c.
Confidentiality
b.
Non-repudiation
d.
Integrity
 

 9. 

The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”
a.
information warfare
c.
eTerrorism
b.
cyberware
d.
cyberterrorism
 

 10. 

____ are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.
a.
Hackers
c.
Crackers
b.
Script kiddies
d.
Elites
 

 11. 

From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.
a.
456,000
c.
562 million
b.
22 million
d.
660 billion
 

 12. 

On average it takes ____ days for a victim to recover from an attack.
a.
three
c.
eight
b.
five
d.
ten
 

 13. 

A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.
a.
threat
c.
threat agent
b.
vulnerability
d.
asset
 

 14. 

____ involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.
a.
Identity theft
c.
Cyberterrorism
b.
White hat hacking
d.
Digital fraud
 

 15. 

Keeping _______ copies of important data stored in a safe place is an example of implementing update defenses within a practical security strategy.
a.
recent
c.
several
b.
back up
d.
only digital
 

 16. 

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.
a.
cyberterrorists
c.
hackers
b.
spies
d.
hacktivists
 

 17. 

In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.
a.
black-hat
c.
hacker
b.
white-hat
d.
slacker
 

 18. 

“____” involves breaking into a car’s electronic system.
a.
Joyriding
c.
Car riding
b.
Car hijack
d.
Car hacking
 

 19. 

Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.
a.
applications
c.
people
b.
systems
d.
tools
 

 20. 

Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
a.
COPPA
c.
GLBA
b.
Sarbox
d.
HIPAA
 

Matching  Match the following descriptions of ways to best defend against attacks.
 
 
a.
Minimize losses
c.
Block attacks
b.
Update defenses
d.
Send secure information
 

 1. 

Local security
 

 2. 

Update hardware and software
 

 3. 

Keep backup copies of important documents
 

 4. 

Scramble data, make sure you are sending over a secure link
 



 
         Start Over