Filters
Question type

Study Flashcards

What level of security access should a computer user have to do their job?


A) password protected
B) least amount
C) limiting amount
D) authorized access

Correct Answer

verifed

verified

What are the four different risk response techniques?

Correct Answer

verifed

verified

Accept,tra...

View Answer

What is the Payment Card Industry Data Security Standard (PCI DSS)?

Correct Answer

verifed

verified

The PCI DSS is a set of security standar...

View Answer

Why are there delays in updating products such as anti-virus software to resist attacks?

Correct Answer

verifed

verified

At the current rate of submiss...

View Answer

Brokers steal new product research or a list of current customers to gain a competitive advantage.

Correct Answer

verifed

verified

Information security is achieved through a combination of what three entities? Provide at least one example of each entity.

Correct Answer

verifed

verified

Products (physical security): The physic...

View Answer

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?


A) HIPAA
B) HLPDA
C) HCPA
D) USHIPA

Correct Answer

verifed

verified

Smart phones give the owner of the device the ability to download security updates.

Correct Answer

verifed

verified

According to the U.S.Bureau of Labor Statistics,what percentage of growth for information security analysts is the available job outlook supposed to reach through 2024?


A) 10
B) 15
C) 18
D) 27

Correct Answer

verifed

verified

In information security,what can constitute a loss?


A) theft of information
B) a delay in transmitting information that results in a financial penalty
C) the loss of good will or a reputation
D) all of the above

Correct Answer

verifed

verified

List and describe three of the characteristics of information that must be protected by information security?

Correct Answer

verifed

verified

Three of the characteristics of informat...

View Answer

One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government.

Correct Answer

verifed

verified

Which position below is considered an entry-level position for a person who has the necessary technical skills?


A) security technician
B) security administrator
C) CISO
D) security manager

Correct Answer

verifed

verified

What term is used to describe a group that is strongly motivated by ideology,but is usually not considered to be well-defined and well-organized?


A) hactivists
B) hacker
C) script kiddies
D) cyberterrorist

Correct Answer

verifed

verified

What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?

Correct Answer

verifed

verified

Vulnerable business processes,...

View Answer

What process describes using technology as a basis for controlling the access and usage of sensitive data?


A) technical controls
B) administrative controls
C) control diversity
D) vendor diversity

Correct Answer

verifed

verified

A vulnerability is a flaw or weakness that allows a threat to bypass security.

Correct Answer

verifed

verified

The Security Administrator reports directly to the CIO.

Correct Answer

verifed

verified

The CompTIA Security+ certification is a vendor-neutral credential.

Correct Answer

verifed

verified

Which of the following are considered threat actors? (Choose all that apply. )


A) brokers
B) competitors
C) administrators
D) individuals

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer