Network Security - Chapter 1

Is this your test? Login to manage it. If not, you can build a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Each of the following is a characteristic of cybercriminals except _______.
2.
1 point
Each of the following is a characteristic of cybercrime except
3.
1 point
In a general sense “security” is _______.
4.
1 point
Utility companies, telecommunications, and financial services are considered prime targets of _____ because attackers can significantly disrupt business and personal activities by destroying a few targets.
5.
1 point
_____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information and to protect all electronic and paper containing personally identifiable financial information.
6.
1 point
Each of the following is a goal of information security except _______.
7.
1 point
Each of the following can be classified as an “insider” except _______.
8.
1 point
By definition a(n) _____ is a person or thing that has the power to carry out a threat.
9.
1 point
The _____ requires that enterprises must guard protected health information and implement policies and procedures to safeguard it.
10.
1 point
_____ ensures that the individual is who they claim to be.
11.
1 point
After an attacker probed a network for information the next step is to _______.
12.
1 point
Each of the following is a successive layer in which information security is achieved except _______.
13.
1 point
_____ ensures that only authorized parties can view the information.
14.
1 point
_____ are a network of attackers, identity thieves, and financial fraudsters.
15.
1 point
An example of _____is not revealing the type of computer, operating system, software, and network connection a computer uses.
16.
1 point
Each of the following is a reason why it is difficult to defend against today’s attackers except _______.
17.
1 point
An example of a(n) _____ is a software defect in an operating system that allows an unauthorized user to gain access to a computer without a password.
18.
1 point
The term _____ is sometimes used to identify anyone who illegally breaks into a computer system.
19.
1 point
The _____ is primarily responsible for assessment, management, and implementation of security
20.
1 point
An organization that purchased security products from different vendors is demonstrating which security principle?