Preview

Information Security Mid-Term Review

Good Essays
Open Document
Open Document
3457 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Mid-Term Review
*** Signifies the Correct answer

Chapter 1 Review Questions Solutions
1. Each of the following is a reason why it is difficult to defend against today’s attackers except _______.
A. complexity of attack tools***
B. weak patch distribution
C. greater sophistication of attacks
D. delays in patching hard work software products
2. In a general sense “security” is _______.
A. protection from only direct actions
B. using reverse attack vectors (RAV) for protection
C. only available on hardened computers and systems
D. the necessary steps to protect a person or property from harm ***
3. _____ ensures that only authorized parties can view the information.
A. Confidentiality***
B. Availability
C. Integrity
D. Authorization
4. Each of the following is a successive layer in which information security is achieved except _______.
A. products
B. purposes***
C. procedures
D. people
5. By definition a(n) _____ is a person or thing that has the power to carry out a threat.
A. vulnerability
B. exploit
C. threat agent***
D. risk
6. _____ ensures that the individual is who they claim to be.
A. Authentication ***
B. Accounting
C. Access control
D. Certification
7. Each of the following is a goal of information security except _______.
A. Foil cyberterrorism
B. Avoid legal consequences
C. Decrease user productivity***
D. Prevent data theft
8. The _____ requires that enterprises must guard protected health information and implement policies and procedures to safeguard it.
A. Hospital Protection and Insurance Association Agreement (HPIAA)
B. Sarbanes-Oxley Act (Sarbox)
C. Gramm-Leach-Bliley Act (GLBA)
D. Health Insurance Portability and Accountability Act (HIPAA) ***
9. Utility companies, telecommunications, and financial services are considered prime targets of _____ because attackers can significantly disrupt business and personal activities by destroying a few targets.
A. white hat hackers
B. script kiddies
C. computer spies
D.

You May Also Find These Documents Helpful