Filters
Question type

Study Flashcards

Match the following terms to the appropriate definitions. -A flaw or weakness that allows a threat agent to bypass security


A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector

Correct Answer

verifed

verified

What country is now the number one source of attack traffic?


A) India
B) Indonesia
C) China
D) Russia

Correct Answer

verifed

verified

Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.

Correct Answer

verifed

verified

True

The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?


A) Encryption
B) Authentication
C) Authorization
D) Accounting

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -An item that has value.


A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector

Correct Answer

verifed

verified

What is a hacker?

Correct Answer

verifed

verified

In the past, the term hacker was commonl...

View Answer

Match the following terms to the appropriate definitions. -​Automated attack package that can be used without an advanced knowledge of computers


A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector

Correct Answer

verifed

verified

Which of the three protections ensures that only authorized parties can view information?


A) Security
B) Availability
C) Integrity
D) Confidentiality

Correct Answer

verifed

verified

D

The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -Attacker who attacks for ideological reasons that are generally not as well defined as a cyberterrorist's motivation


A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -The means by which an attack could occur​


A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector

Correct Answer

verifed

verified

Describe script kiddies.

Correct Answer

verifed

verified

Script kiddies are individuals who want ...

View Answer

To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?


A) Nimda
B) Slammer
C) Love Bug
D) Code Red

Correct Answer

verifed

verified

Which term below is frequently used to describe the tasks of securing information that is in a digital format?


A) network security
B) information security
C) physical security
D) logical security

Correct Answer

verifed

verified

A security administrator has both technical ​knowledge and managerial skills.

Correct Answer

verifed

verified

True

Proper ________________ involves identifying risks but making the decision to not engage in the activity.​

Correct Answer

verifed

verified

____________________ provides tracking of events.

Correct Answer

verifed

verified

What kind of server connects a remote system through the Internet to local serial ports using TCP/IP?


A) Remote Access Server
B) VPN server
C) Serial server
D) HTTP server

Correct Answer

verifed

verified

An _______________ is a type of threat that can come from employees, contractors, and business partners, such as a disgruntled worker.​

Correct Answer

verifed

verified

The ___________________ reports directly to the chief information officer (CIO), and is responsible for assessing, managing, and implementing security.

Correct Answer

verifed

verified

Chief info...

View Answer

Showing 1 - 20 of 50

Related Exams

Show Answer