Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Principles of Information Security 7th Edition by Whitman and Mattord

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
06-09-2024
Geschreven in
2024/2025

Principles of Information Security 7th Edition by Whitman and Mattord

Instelling
Vak

Voorbeeld van de inhoud

TEST BANK For Principles of Information Security 7th
Edition by Whitman and Mattord


In information security, what can constitute a loss? - ANSWER: theft of information


a delay in transmitting information that results in a financial penalty


the loss of good will or a reputation

In information security, which of the following is an example of a threat actor? -
ANSWER: a force of nature such as a tornado that could destroy computer
equipment


a virus that attacks a computer network


a person attempting to break into a secure computer network

In what kind of attack can attackers make use of millions of computers under their
control in an attack against a single server or network? - ANSWER: distributed

Select the information protection item that ensures that information is correct and
that no unauthorized person or malicious software has altered that data. - ANSWER:
integrity

To date, the single most expensive malicious attack occurred in 2000, which cost an
estimated $8.7 billion. What was the name of this attack? - ANSWER: Love Bug

Under which laws are health care enterprises required to guard protected health
information and implement policies and procedures whether it be in paper or
electronic format? - ANSWER: HIPAA

What class of attacks use innovative attack tools and once a system is infected it
silently extracts data over an extended period? - ANSWER: Advanced Persistent
Threat

What level of security access should a computer user have to do their job? -
ANSWER: least amount

What process describes using technology as a basis for controlling the access and
usage of sensitive data? - ANSWER: technical controls

, What term best describes any premeditated, politically motivated attack against
information, computer systems, computer programs, and data which results in
violence against noncombatant targets by subnational groups or clandestine agents?
- ANSWER: cyberterrorism

What term describes a layered security approach that provides the comprehensive
protection? - ANSWER: defense-in-depth

What term is used to describe a group that is strongly motivated by ideology, but is
usually not considered to be well-defined and well-organized? - ANSWER: hactivists

What term is used to describe state-sponsored attackers that are used for launching
computer attacks against their foes? - ANSWER: nation state actors

What term refers to an action that provides an immediate solution to a problem by
cutting through the complexity that surrounds it? - ANSWER: silver bullet

What type of theft involves stealing another person's personal information, such as a
Social Security number, and then using the information to impersonate the victim,
generally for financial gain? - ANSWER: identity theft

Which law requires banks and financial institutions to alert customers of their
policies and practices in disclosing customer information? - ANSWER: Gramm-Leach-
Bliley

Which of the following are considered threat actors? (Choose all that apply.) -
ANSWER: brokers


competitors

Which of the following describes various supporting structures for implementing
security that provides a resource of how to create a secure IT environment? (Choose
all that apply.) - ANSWER: reference architectures


industry-standard frameworks

Which of the following ensures that data is accessible to authorized users? -
ANSWER: availability

Which of the following is a common security framework? (Choose all that apply.) -
ANSWER: ISO


COBIT

Gekoppeld boek

Geschreven voor

Vak

Documentinformatie

Geüpload op
6 september 2024
Aantal pagina's
7
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
kushboopatel6867
5.0
(1)

Maak kennis met de verkoper

Seller avatar
kushboopatel6867 Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
1 jaar
Aantal volgers
0
Documenten
1282
Laatst verkocht
8 maanden geleden
EXCELLENT HOMEWORK HELP AND TUTORING ,

EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A Am an expert on major courses especially; psychology,Nursing, Human resource Management and Mathemtics Assisting students with quality work is my first priority. I ensure scholarly standards in my documents and that's why i'm one of the BEST GOLD RATED TUTORS in STUVIA. I assure a GOOD GRADE if you will use my work.

Lees meer Lees minder
5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen