Identify the letter of the choice that best completes the statement or answers the question




НазваниеIdentify the letter of the choice that best completes the statement or answers the question
страница7/7
Дата конвертации30.10.2012
Размер0.79 Mb.
ТипДокументы
1   2   3   4   5   6   7

CCIS2400 (Security Essentials) Ch-1 Study Guide


Multiple Choice

Identify the letter of the choice that best completes the statement or answers the question.


____ 1. The _____ attack unleashed 7,000 attacks per day as an e-mail distributed denial-of-service (DDoS) worm.

a.

Bugbear

c.

Klez

b.

Yaha

d.

Code Red



____ 2. The _____ attack doubled the number of infections every 37 minutes.

a.

Nimda

c.

Code Red

b.

Blaster

d.

Klez



____ 3. How many reported incidences of attacks were reported to CERT in 1988?

a.

1

c.

252

b.

6

d.

773



____ 4. _____ ensures that the information is correct and that no unauthorized person or malicious software program can or has altered that data.

a.

Availability

c.

Integrity

b.

Confidentiality

d.

Identity



____ 5. _____ ensures that only authorized parties can view information.

a.

Security

c.

Integrity

b.

Availability

d.

Confidentiality



____ 6. The latest Federal Bureau of Investigation (FBI) annual Computer Crime and Security Survey estimated the total annual loss due to data theft to be more than _____.

a.

$100 million

c.

$500 million

b.

$170 million

d.

$1 billion



____ 7. Under the _____ act, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

a.

HIPAA

c.

HCPA

b.

HLPDA

d.

USHIPA



____ 8. What is the maximum fine for those who wrongfully disclose individually identifiable health information with the intent to sell it?

a.

$100,000

c.

$500,000

b.

$250,000

d.

$1,000,000



____ 9. The _____ act is designed to broaden the surveillance of law enforcement agencies so they can detect and suppress terrorism.

a.

Gramm-Leach-Bliley

b.

Sarbanes-Oxley

c.

California Database Security Breach

d.

USA PATRIOT



____ 10. COPPA requires operators of online services or Web sites designed for children under the age of _____ to obtain parental consent prior to the collection, use, disclosure, or display of a child’s personal information.

a.

8

c.

13

b.

10

d.

16



____ 11. In a company of 500 employees, it is estimated that _____ employees are required to combat a virus attack.

a.

2

c.

7

b.

5

d.

10



____ 12. What is another name for unsolicited e-mail messages?

a.

spam

c.

trash

b.

spawn

d.

scam



____ 13. According to Ferris Research, unsolicited e-mail messages now account for _____ of the total number of daily e-mail messages sent in the United States.

a.

15%

c.

45%

b.

30%

d.

62%



____ 14. According to the Federal Trade Commission (FTC), at least _____ million Americans, or about 3.4% of the adult population, have been victims of identity theft.

a.

2

c.

7

b.

5

d.

10



____ 15. In information security a loss can be _____.

a.

theft of information

b.

a delay in transmitting information that results in a financial penalty

c.

the loss of good will or a reputation

d.

all of the above



____ 16. In information security, a threat agent can be defined as _____.

a.

a force of nature such as a tornado that could destroy computer equipment

b.

a virus that attacks a computer network

c.

an unsecured computer network

d.

both a and b

e.

a, b, and c



____ 17. Which of these factors does NOT illustrate why information security is becoming increasingly difficult?

a.

faster processors

c.

faster detection of weaknesses

b.

growing sophistication of attacks

d.

distributed attacks



____ 18. A type of software that repairs security flaws in an application is called a(n) ____________.

a.

hot fix

c.

repair

b.

repair

d.

patch



____ 19. Which of these is NOT a characteristic of information?

a.

integrity

c.

conformity

b.

confidentiality

d.

availability



____ 20. Which of these is NOT intended to protect information?

a.

people

c.

equipment

b.

policies

d.

confidentiality
1   2   3   4   5   6   7

Похожие:

Identify the letter of the choice that best completes the statement or answers the question iconSection 1 Analytic Question Answers

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers to questions not answered at Mayor’s Question Time on

Identify the letter of the choice that best completes the statement or answers the question iconWritten Answers arising from the Plenary Assembly Question and Answer Session with Transport for London

Identify the letter of the choice that best completes the statement or answers the question iconNo fee of any kind may be charged for the material; all copied material must clearly identify its source and contain the statement on copyright shown below

Identify the letter of the choice that best completes the statement or answers the question iconFinancial statements Income statement Balance sheet Statement of cash flows Statement of changes in equity Notes to and forming part of the financial report

Identify the letter of the choice that best completes the statement or answers the question iconAppendix 1 London Assembly (Mayor’s Question Time) 12 December 2007 Transcript – Question and Answer Session

Identify the letter of the choice that best completes the statement or answers the question iconPhil265/Rels265 Final Exam 31 Multiple choice or True-False worth 1 mark each 3 Short Answer Questions from choice of 5 worth 3 marks each (paragraph or two in length) Introduction to Philosophy

Identify the letter of the choice that best completes the statement or answers the question iconThe Very Handy Manual: How to Catch and Identify Bees

Identify the letter of the choice that best completes the statement or answers the question icon20 Answers

Identify the letter of the choice that best completes the statement or answers the question iconLetter from the President


Разместите кнопку на своём сайте:
lib.convdocs.org


База данных защищена авторским правом ©lib.convdocs.org 2012
обратиться к администрации
lib.convdocs.org
Главная страница