An information security ____ position focuses on the administration and management of
plans, policies, and people.
a. manager c. auditor
b. engineer d. inspector - ✔✔manager
The position of ____ is generally an entry
...
An information security ____ position focuses on the administration and management of
plans, policies, and people.
a. manager c. auditor
b. engineer d. inspector - ✔✔manager
The position of ____ is generally an entry-level position for a person who has the
necessary technical skills.
a. security technician c. CISO
b. security administrator d. security manager - ✔✔security technician
Approximately ____ percent of households in the United States use the Internet for
managing their finances.
a. 60 c. 80
b. 70 d. 90 - ✔✔80
The term ____ is frequently used to describe the tasks of securing information that is in
a digital format.
a. network security c. physical security
b. information security d. logical security - ✔✔information security
____ ensures that only authorized parties can view information.
a. Security c. Integrity
b. Availability d. Confidentiality - ✔✔confidentiality
____ ensures that information is correct and that no unauthorized person or malicious
software has altered that data.
a. Availability c. Integrity
b. Confidentiality d. Identity - ✔✔integrity
____ ensures that the individual is who they claim to be (the authentic or genuine
person) and not an imposter.
a. Encryption c. Authorization
b. Authentication d. Accounting - ✔✔authentication
In information security, a loss can be ____.
a. theft of information
b. a delay in transmitting information that results in a financial penalty
c. the loss of good will or a reputation
d. all of the above - ✔✔all of the above
In information security, an example of a threat agent can be ____.
a. a force of nature such as a tornado that could destroy computer equipmentb. a virus that attacks a computer network
c. an unsecured computer network
d. both a and b - ✔✔both a and b
Business ____ theft involves stealing proprietary business information such as research
for a new drug or a list of customers that competitors are eager to acquire.
a. identity c. plan
b. data d. record - ✔✔data
What is the maximum fine for those who wrongfully disclose individually identifiable
health information with the intent to sell it?
a. $100,000 c. $500,000
b. $250,000 d. $1,000,000 - ✔✔$250,000
The ____ Act requires banks and financial institutions to alert customers of their policies
and practices in disclosing customer information.
a. Gramm-Leach-Bliley c. California Database Security Breach
b. Sarbanes-Oxley d. USA Patriot - ✔✔Gramm-Leach-Bliley Security Breach
The single most expensive malicious attack was the 2000 ____, which cost an
estimated $8.7 billion.
a. Nimda c. Love Bug
b. Slammer d. Code Red - ✔✔love bug
____ are a loose-knit network of attackers, identity thieves, and financial fraudsters.
a. Cybercriminals c. Computer spies
b. Cyberterrorists d. Hackers - ✔✔cybercriminals
Targeted attacks against financial networks, unauthorized access to information, and
the theft of personal information is sometimes known as ____.
a. spam c. cybercrime
b. phishing d. cyberterrorism - ✔✔cybercrime
What is another name for unsolicited e-mail messages?
a. spam c. trash
b. spawn d. scam - ✔✔spam
[Show More]