Chapter 1 NSS

Is this your test? Login to manage it. If not, you can build a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Why do cyberterrorists target power plants, air traffic control centers, and water systems?
2.
1 point
What is the first step in the Cyber Kill Chain®?
3.
1 point
Which of the following was used to describe attackers who would break into a computer system without the owner’s permission and publicly disclose the vulnerability?
4.
1 point
________ ensures that individuals are who they claim to be.
5.
1 point
Each of the following can be classified as an “insider” EXCEPT
6.
1 point
Each of the following is a successive layer in which information security is achieved EXCEPT .
7.
1 point
The ___________ is primarily responsible for assessing, managing, and implementing security.
8.
1 point
Which phrase describes the term “security” in a general sense?
9.
1 point
What is a person or element that has the power to carry out a threat?
10.
1 point
_______ ensures that only authorized parties can view the information.
11.
1 point
What is the difference between a hactivist and a cyberterrorist?
12.
1 point
Why can brokers command such a high price for what they sell?
13.
1 point
Which the following is NOT a reason why it is difficult to defend against today’s attackers?
14.
1 point
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
15.
1 point
What is an objective of state-sponsored attackers?
16.
1 point
Which of the following is NOT a characteristic of Advanced Persistent Threat (APT)?
17.
1 point
An organization that purchased security products from different vendors is demon-strating which security principle?
18.
1 point
What are attackers called who belong to a network of identity thieves and financial fraudsters?
19.
1 point
An example of ___________ is not revealing the type of computer, operating system, software, and network connection a computer uses.
20.
1 point
Each of the following is a goal of information security EXCEPT