CSIA 105 Questions and Answers(A+ Solution guide)
according to the US bureau of labor statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade - Answer-18 what information security position reports to the ciso and supervises technicians, administrators, and security staff? - Answer-manager Which position below is considered an entry-level position for a person who has the necessary technical skills? - Answer-security technician what country is now the number one source of attack traffic? - Answer-Indonesia What kind of server connects a remote system through the Internet to local serial ports using TCP/IP? - Answer-serial server in what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or Network - Answer-distributed Which term below is frequently used to describe the tasks of securing information that is in a digital format? - Answer-information security the security protection item that ensures that the individual is who they claim to be the authentic or genuine person and not and an imposter is known as - Answer-authentication which of the three protections ensures that only authorized parties can view information - Answerconfidentiality select below the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data - Answer-integrity what type of theft involves stealing another person's personal information, such as a social security number, and then using the information to impersonate the victim, generally for financial gain? - Answer-identity theftin information security, what constitutes a loss? - Answer-all all of the above to date, the single most expensive malicious attack occurred in 2000, which cost an estimated 8.7 billion dollars. what was the name of the attack? - Answer-love bug What term is used to describe a loose network of attackers, identity thieves, and financial fraudsters? - Answer-Cybercriminals Select below the term that is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so - Answer-script kiddies healthcare enterprises are required to guard protected health information and implement policies and procedures whether it be in paper or electronic format - Answer-HIPAA purpose is to strengthen domestic security and broaden the powers of law enforcement agencies with regards to identifying and stopping terrorists - Answer-us Patriot act standards created to require accessibility of electronic media websites software applications, operating systems, video, etc. - Answer-Americans with disabilities
Escuela, estudio y materia
- Institución
- CSIA 105
- Grado
- CSIA 105
Información del documento
- Subido en
- 2 de marzo de 2024
- Número de páginas
- 11
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
Documento también disponible en un lote