Study sets, textbooks, questions
Upgrade to remove ads
Chapter 1 Review Questions
Terms in this set (20)
Each of the following is a reason why it is difficult to defend against today's attackers except:
complexity of attack tools
In a general sense "security" is:
the steps necessary to protect a person or property from harm
_____ ensures that only authorized parties can view the information.
Why can brokers command such a high price for what they sell?
The vulnerability they uncover was previously unknown and is unlikely to be patched quickly
Each of the following is a successive layer in which information security is achieved except:
What is a person or element that has the power to carry out a threat?
In information security terminology a(n) _____ is a flaw or weakness that allows an attacker to bypass security protections.
______ ensures that individuals are who they claim to be.
The ______ requires that enterprises must guard protected health information and implement policies and procedures to safeguard it.
Health Insurance Portability and Accountability Act (HIPAA)
The motivation of _______ is attacking for the sake of their principles or beliefs.
What is the difference between a hactivist and a cyberterrorist?
The aim of a hactivist is not to incite panic like cyberterrorists.
Keeping backup copies of important data stored in a safe place is an example of
Each of the following can be classified as an "insider" except
What is an objective of state-sponsored attackers?
to spy on citizens
Each of the following is a characteristic of cybercriminals except
Each of the following is a characteristic of cybercrime except
exclusive use of worms and viruses
An example of a(n) ______ is a software defect in an operating system that allows an unauthorized user to gain access to a computer without a password.
_______ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information and to protect all electronic devices and paper containing personally identifiable financial information.
Gramm-Leach-Bliley Act (GLBA)
_______ ensures that the information is correct and no unauthorized person or malicious software has altered that data.
Protecting information is accomplished by
protecting the devices on which the information is found
Sets found in the same folder
Network Security Chapters 1-3
Chapter 2 Review Questions
Chapter 3 Review Questions
Chapter 4 Review Questions
Other sets by this creator
Web Development Chapter 14
Network Security Chapters 4-6
Chapter 5 Review Questions
Web Development Ch 5
Other Quizlet sets
ch 14- religion
Meridians Midterm 2