CSIA 105 EXAM ANSWERS WITH ACTUAL QUESTIONS 100% VERIFIED.
18 ANS << according to the US bureau of Labor statistics, what percentage of
growth is the available job outlook supposed to reach by the end of the decade
manager ANS << what information security position reports to the ciao and
supervises technicians, administrators, and security staff?
security technician ANS << Which position below is considered an entry-level
position for a person who has the necessary technical skills?
Indonesia ANS << what country is now the number one source of attack traffic?
serial server ANS << What kind of server connects a remote system through the
Internet to local serial ports using TCP/IP?
,CSIA 105 EXAM
distributed ANS << in what kind of attack can attackers make use of hundreds of
thousands of computers under their control in an attack against a single server or
Network
information security ANS << Which term below is frequently used to describe the
tasks of securing information that is in a digital format?
authentication ANS << the security protection item that ensures that the
individual is who they claim to be the authentic or genuine person and not and an
imposter is known as
confidentiality ANS << which of the three protections ensures that only
authorized parties can view information
integrity ANS << select below the information protection item that ensures that
information is correct and that no unauthorized person or malicious software has
altered that data
identity theft ANS << what type of theft involves stealing another person's
personal information, such as a social security number, and then using the
information to impersonate the victim, generally for financial gain?
all all of the above ANS << in information security, what constitutes a loss?
love bug ANS << to date, the single most expensive malicious attack occurred in
2000, which cost an estimated 8.7 billion dollars. what was the name of the
attack?
, CSIA 105 EXAM
Cybercriminals ANS << What term is used to describe a loose network of
attackers, identity thieves, and financial fraudsters?
script kiddies ANS << Select below the term that is used to describe individuals
who want to attack computers yet lack the knowledge of computers and networks
needed to do so
HIPAA ANS << healthcare enterprises are required to guard protected health
information and implement policies and procedures whether it be in paper or
electronic format
us Patriot Act ANS << purpose is to strengthen domestic security and broaden
the powers of law enforcement agencies with regards to identifying and stopping
terrorists
Americans with disabilities ANS << standards created to require accessibility of
electronic media websites software applications, operating systems, video, etc.
computer security act ANS << created 2 improve the security and privacy of
sensitive information and to create acceptable security practices
FERPA ANS << created to protect the privacy of student records
the children's online act ANS << an act created to help protected children under
the age of 13 from exploitation by governing the online collection of the child's
personal information