Final exam with answers
Smart phones give the owner of the device the ability to
download security updates. True/False - CORRECT
ANSWERS ✔✔False
What term is used to describe state-sponsored attackers
that are used for launching computer attacks against
their foes? - CORRECT ANSWERS ✔✔nation state actors
Which position below is considered an entry-level position
for a person who has the necessary technical skills? -
CORRECT ANSWERS ✔✔security technician
Which of the three protections ensures that only
authorized parties can view information? - CORRECT
ANSWERS ✔✔confidentiality
What term best describes any premeditated, politically
motivated attack against information, computer systems,
computer programs, and data which results in violence
against noncombatant targets by subnational groups or
clandestine agents? - CORRECT ANSWERS
✔✔cyberterrorism
,What type of diversity is being implemented if a company
is using multiple security products from different
manufacturers? - CORRECT ANSWERS ✔✔vendor diversity
Which of the following ensures that data is accessible to
authorized users? - CORRECT ANSWERS ✔✔availability
According to the U.S. Bureau of Labor Statistics, what
percentage of growth for information security analysts is
the available job outlook supposed to reach through
2024? - CORRECT ANSWERS ✔✔18
What term refers to an action that provides an immediate
solution to a problem by cutting through the complexity
that surrounds it? - CORRECT ANSWERS ✔✔silver bullet
A vulnerability is a flaw or weakness that allows a threat
to bypass security. - CORRECT ANSWERS ✔✔True
What process describes using technology as a basis for
controlling the access and usage of sensitive data? -
CORRECT ANSWERS ✔✔technical controls
,To date, the single most expensive malicious attack
occurred in 2000, which cost an estimated $8.7 billion.
What was the name of this attack? - CORRECT ANSWERS
✔✔Love Bug
What information security position reports to the CISO
and supervises technicians, administrators, and security
staff? - CORRECT ANSWERS ✔✔security manager
Brokers steal new product research or a list of current
customers to gain a competitive advantage. True/False -
CORRECT ANSWERS ✔✔False
Under which laws are health care enterprises required to
guard protected health information and implement
policies and procedures whether it be in paper or
electronic format? - CORRECT ANSWERS ✔✔HIPAA
Select the term that best describes automated attack
software? - CORRECT ANSWERS ✔✔open-source
intelligence
In information security, what can constitute a loss?
a. the loss of good will or a reputation
b. all of the above
, c. a delay in transmitting information that results in a
financial penalty
d. theft of information - CORRECT ANSWERS ✔✔d
Which of the following is malicious computer code that
reproduces itself on the same computer? - CORRECT
ANSWERS ✔✔virus
What social engineering principal convinces a victim an
immediate action is needed? - CORRECT ANSWERS
✔✔urgency
A virus self-replicates on the host computer and spreads
to other computers by itself. True/False - CORRECT
ANSWERS ✔✔False
Phishing is sending an email or displaying a web
announcement that falsely claims to be from a legitimate
enterprise in an attempt to trick the user into
surrendering private information. True/False - CORRECT
ANSWERS ✔✔True
Once the malware reaches a system through circulation,
then it must embed itself into that system. True/False -
CORRECT ANSWERS ✔✔True