Filters
Question type

Study Flashcards

____________________ provides tracking of events.

Correct Answer

verifed

verified

List three of the federal and state laws that have been enacted to protect the privacy of electronic data.

Correct Answer

verifed

verified

1. The Health Insurance Portability and ...

View Answer

____ ensures that information is correct and that no unauthorized person or malicious software has altered that data.


A) Availability
B) Confidentiality
C) Integrity
D) Identity

Correct Answer

verifed

verified

An information security ____ position focuses on the administration and management of plans, policies, and people.


A) manager
B) engineer
C) auditor
D) inspector

Correct Answer

verifed

verified

_________________________ is focused on protecting the valuable electronic information of organizations and users.

Correct Answer

verifed

verified

Informatio...

View Answer

The position of ____ is generally an entry-level position for a person who has the necessary technical skills.


A) security technician
B) security administrator
C) CISO
D) security manager

Correct Answer

verifed

verified

A study by Foote Partners showed that security certifications earn employees ____ percent more pay than their uncertified counterparts.


A) 10 to 14
B) 12 to 15
C) 13 to 14
D) 14 to 16

Correct Answer

verifed

verified

What is the maximum fine for those who wrongfully disclose individually identifiable health information with the intent to sell it?


A) $100,000
B) $250,000
C) $500,000
D) $1,000,000

Correct Answer

verifed

verified

What is another name for unsolicited e-mail messages?


A) spam
B) spawn
C) trash
D) scam

Correct Answer

verifed

verified

Discuss why delays in patching are making information security more difficult.

Correct Answer

verifed

verified

Hardware and software vendors are overwh...

View Answer

Under the ____, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.


A) HIPAA
B) HLPDA
C) HCPA
D) USHIPA

Correct Answer

verifed

verified

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.


A) network security
B) information security
C) physical security
D) logical security

Correct Answer

verifed

verified

In a general sense, assurance may be defined as the necessary steps to protect a person or property from harm.

Correct Answer

verifed

verified

Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.

Correct Answer

verifed

verified

Describe script kiddies.

Correct Answer

verifed

verified

Script kiddies are individuals who want ...

View Answer

Describe the security principle of simplicity.

Correct Answer

verifed

verified

Because attacks can come from a variety ...

View Answer

An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user's knowledge or permission.

Correct Answer

verifed

verified

Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.


A) identity
B) data
C) plan
D) record

Correct Answer

verifed

verified

____ involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.


A) Cyberterrorism
B) Identity theft
C) Phishing
D) Scam

Correct Answer

verifed

verified

____ are a loose-knit network of attackers, identity thieves, and financial fraudsters.


A) Cybercriminals
B) Cyberterrorists
C) Computer spies
D) Hackers

Correct Answer

verifed

verified

Showing 21 - 40 of 42

Related Exams

Show Answer