Hands on Project 1-3

431 Words2 Pages
Chapter 1 Review Questions 1. Each of the following is a reason it is difficult to defend against today’s attackers except____. Answer: a. complexity of attack tools 2. In a general sense, “security “is_____. Answer: d. the necessary steps to protect a person or property from harm 3. _____ ensures that only authorized parties can view the information. Answer: a. Confidentiality 4. Each of the following is a successive layer in which information security is achieved except _____. Answer: b. purposes 5. By definition, a(n) ____is a person or thing that has the power to carry out a threat. Answer: c. threat agent 6. _____ ensures that the individual is who they claim to be. Answer: a. Authentication 7. Each of the following is a goal of information security except______. Answer: c decrease user productivity 8. The ____ requires that enterprises must guard protected health information and implement policies and procedures to safeguard it. Answer: d. Health Insurance Portability and Accountability Act (HIPPA) 9. Utility companies, telecommunications, and financial services are considered prime targets of _____ because attackers can significantly disrupt business and personal activities by destroying a few targets. Answer: d. cyberterrorists 10. After an attacker probed a network for information, the next step is to _____. Answer a. penetrate any defenses 11. An organization that purchased security products from different vendors is demonstrating which security principle? Answer: b. diversity 12. Each of the following can be classified as an “insider” except______. Answer: c. cybercriminals 13. ____ are a network of attackers, identity thieves and financial fraudsters. Answer: c. Cybercriminals 14. Each of the following is a characteristic of cybercriminals except ______. Answer: c. low

More about Hands on Project 1-3

Open Document