Filters
Question type

Study Flashcards

The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.

Correct Answer

verifed

verified

True

Security ____________________ have both technical knowledge and managerial skills and analyze and design security solutions within a specific entity.

Correct Answer

verifed

verified

In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.


A) centered
B) local
C) remote
D) distributed

Correct Answer

verifed

verified

Briefly describe computer spies.

Correct Answer

verifed

verified

A computer spy is a person who has been ...

View Answer

The demand for IT professionals who know how to secure networks and computers is at an all-time low.

Correct Answer

verifed

verified

In information security, a loss can be ____.


A) theft of information
B) a delay in transmitting information that results in a financial penalty
C) the loss of good will or a reputation
D) all of the above

Correct Answer

verifed

verified

Recent employment trends indicate that employees with security certifications are in high demand.

Correct Answer

verifed

verified

Why is the speed of attacks making the challenge of keeping computers secure more difficult?

Correct Answer

verifed

verified

With modern tools at their disposal, attackers can quickly scan systems to find weaknesses and launch attacks with unprecedented speed. Many tools can even initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.

The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.


A) Gramm-Leach-Bliley
B) Sarbanes-Oxley
C) California Database Security Breach
D) USA Patriot

Correct Answer

verifed

verified

Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information is sometimes known as ____.


A) spam
B) phishing
C) cybercrime
D) cyberterrorism

Correct Answer

verifed

verified

What is a hacker?

Correct Answer

verifed

verified

In the past, the term hacker was commonl...

View Answer

Approximately ____ percent of households in the United States use the Internet for managing their finances.


A) 60
B) 70
C) 80
D) 90

Correct Answer

verifed

verified

Information security is achieved through a combination of what three entities? Provide at least one example of each entity.

Correct Answer

verifed

verified

1. Products (physical security): The phy...

View Answer

In information security, an example of a threat agent can be ____.


A) a force of nature such as a tornado that could destroy computer equipment
B) a virus that attacks a computer network
C) an unsecured computer network
D) both a and b

Correct Answer

verifed

verified

D

The single most expensive malicious attack was the 2000 ____, which cost an estimated $8.7 billion.


A) Nimda
B) Slammer
C) Love Bug
D) Code Red

Correct Answer

verifed

verified

____ attacks are responsible for half of all malware delivered by Web advertising.


A) "Canadian Pharmacy"
B) Fake antivirus
C) Melissa
D) Slammer

Correct Answer

verifed

verified

____ ensures that only authorized parties can view information.


A) Security
B) Availability
C) Integrity
D) Confidentiality

Correct Answer

verifed

verified

List and describe two of the four generally recognized security positions.

Correct Answer

verifed

verified

Chief Information Security Officer (CISO...

View Answer

Match the following terms to the appropriate definitions.

Premises
a person who has been hired to break into a computer and steal information
intended to cause panic, provoke violence, or result in a financial catastrophe
an event or action that might defeat security measures in place and result in a loss
plans and policies established by an organization to ensure that people correctly use the products
a weakness that allows a threat agent to bypass security
the likelihood that a threat agent will exploit a vulnerability
something that has value
to take advantage of a vulnerability
a person or thing that has the power to carry out a threat
Responses
asset
risk
exploit
procedures
threat agent
threat
vulnerability
computer spy
cyberterrorism

Correct Answer

a person who has been hired to break into a computer and steal information
intended to cause panic, provoke violence, or result in a financial catastrophe
an event or action that might defeat security measures in place and result in a loss
plans and policies established by an organization to ensure that people correctly use the products
a weakness that allows a threat agent to bypass security
the likelihood that a threat agent will exploit a vulnerability
something that has value
to take advantage of a vulnerability
a person or thing that has the power to carry out a threat

In a general sense, ____________________ may be defined as the necessary steps to protect a person or property from harm.

Correct Answer

verifed

verified

Showing 1 - 20 of 42

Related Exams

Show Answer