SOLUTIONS GUARANTEED PASS
When an incident violates civil or criminal law, it is the
organization's responsibility to notify the proper
authorities; selecting the appropriate law enforcement
agency depends on ___.
a. the networker provider the hacker used
b. the type of crime committed
c. how many perpetrators were involved
d. what kind of computer the hacker used
the type of crime committed
A potential weakness in an asset or its defensive
control system(s) is known as a
a. threat
b. attack
c. exploit
d. vulnerability
vulnerability
According to the CIA triad, which of the following is
the most desirable characteristic for privacy?
a. integrity
b. availability
c. confidentiality
d. accountability
confidentiality
,Acts of ___ can lead to unauthorized real or virtual
actions that enable information gatherers to enter
premises or systems that they have not been
authorized to access
a. bypass
b. theft
c. security
d. trespass
trespass
An intentional or unintentional act that can damage or
otherwise compromise information and the systems
that support it is known as a ___
a. threat
b. attach
c. exploit
d. vulnerability
attack
Any event or circumstance that has the potential to
adversely affect operations and assets is known as
a(n) ___
a. threat
b. vulnerability
c. exploit
d. attack
threat
Force majeure includes all of the following EXCEPT:
a. civil disorder
, b. acts of war
c. armed robbery
d. forces of nature
armed robbery
Human error or failure often can be prevented with
training, ongoing awareness activities, and ___.
a. outsourcing
b. ISO 27000
c. hugs
d. technical controls
technical controls
Which of the 12 categories of threats best describes a
situation where the adversary removes data from a
victim's computer?
a. espionage or trespass
b. information extortion
c. theft
d. sabotage or vandalism
theft
Which of the following functions of IS management
seeks to dictate certain behavior within the
organization through a set of organizational
guidelines?
a. policy
b. people
c. programs
d. planning