Скачать 0.79 Mb.
CCIS2400 (Security Essentials) Ch-1 Study Guide
Identify the letter of the choice that best completes the statement or answers the question.
____ 1. The _____ attack unleashed 7,000 attacks per day as an e-mail distributed denial-of-service (DDoS) worm.
____ 2. The _____ attack doubled the number of infections every 37 minutes.
____ 3. How many reported incidences of attacks were reported to CERT in 1988?
____ 4. _____ ensures that the information is correct and that no unauthorized person or malicious software program can or has altered that data.
____ 5. _____ ensures that only authorized parties can view information.
____ 6. The latest Federal Bureau of Investigation (FBI) annual Computer Crime and Security Survey estimated the total annual loss due to data theft to be more than _____.
____ 7. Under the _____ act, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
____ 8. What is the maximum fine for those who wrongfully disclose individually identifiable health information with the intent to sell it?
____ 9. The _____ act is designed to broaden the surveillance of law enforcement agencies so they can detect and suppress terrorism.
____ 10. COPPA requires operators of online services or Web sites designed for children under the age of _____ to obtain parental consent prior to the collection, use, disclosure, or display of a child’s personal information.
____ 11. In a company of 500 employees, it is estimated that _____ employees are required to combat a virus attack.
____ 12. What is another name for unsolicited e-mail messages?
____ 13. According to Ferris Research, unsolicited e-mail messages now account for _____ of the total number of daily e-mail messages sent in the United States.
____ 14. According to the Federal Trade Commission (FTC), at least _____ million Americans, or about 3.4% of the adult population, have been victims of identity theft.
____ 15. In information security a loss can be _____.
____ 16. In information security, a threat agent can be defined as _____.
____ 17. Which of these factors does NOT illustrate why information security is becoming increasingly difficult?
____ 18. A type of software that repairs security flaws in an application is called a(n) ____________.
____ 19. Which of these is NOT a characteristic of information?
____ 20. Which of these is NOT intended to protect information?