CSIA 105 Assessment Exam Questions
with Correct Answers
us Patriot act - Answer-purpose is to strengthen domestic security and broaden the
powers of law enforcement agencies with regards to identifying and stopping terrorists
Americans with disabilities - Answer-standards created to require accessibility of
electronic media websites software applications, operating systems, video, etc.
computer security act - Answer-created 2 improve the security and privacy of sensitive
information and to create acceptable security practices
FERPA - Answer-created to protect the privacy of student records
the children's online act - Answer-an act created to help protected children under the
age of 13 from exploitation by governing the online collection of the child's personal
information
Gramm-Leach-Bliley Act - Answer-requires Banks and financial institutions to alert
customers of their policies and practices in disclosing customer information
exploit kit - Answer-Script kiddies acquire which item below from other attackers to
easily craft an attack:
Sarbanes-Oxley Act - Answer-created for corporate governance and financial practice
payment-card industry act - Answer-defines minimum requirements for merchants and
service providers to protect cardholder data
difficulties: human error, contamination, not knowing policy, live operations - Answer-
what are some key things people need to know about how to handle evidence related to
different types of disputes civil, criminal, private? what makes this difficult at times
security administrator - Answer-Ian recently earned his security certification and has
been offered a promotion to a position that requires him to analyze and design security
solutions as well as identifying users knees. which of these generally recognized
security positions has in been offered
Misconfiguration - Answer-alyona has been asked by her supervisor to give a
presentation regarding reasons why security attacks continue to be successful. she has
decided to focus on the issue of widespread vulnerabilities. which of the following would
a alyona not include in her presentation
, vulnerable business processes - Answer-Tatiana is discussing with her supervisor
potential reasons why a recent attack was successful against one of their systems.
which of the following configuration issues would not covered
security and convenience are inversely proportional - Answer-adone is attempting to
explain to his friend the relationship between security and convenience. which of the
following statements would he use
when two concurrent threads of execution access a shared resource simultaneously
resulting in unintended consequences - Answer-what is a race condition
confidentiality - Answer-which of the following ensures that only authorized parties can
view protected information
greater sophistication of defense tools - Answer-which of the following is not a reason
why it is difficult to defend against today's attacks
purposes - Answer-which of the following is not a successive layer in which information
security is achieved
through products, people, and procedures on the devices that store, manipulate, and
transmit the information - Answer-complete this definition of information security. that
which protects the integrity confidentiality and availability of information
security is a war that must be won at all cost - Answer-which of the following is not true
regarding security
information - Answer-which of the following is an Enterprise critical asset
extinguish risk - Answer-Gunner is creating a document that explains risk response
techniques which of the following would he not list and explain in his document
diversity - Answer-an organization that practices purchasing products from different
vendors is demonstrating which security principle
to spy on citizens - Answer-What is an objective of state-sponsored attackers?
Gramm-Leach-Bliley Act (GLBA) - Answer-which act requires Banks and financial
institutions to alert their customers of their policies in disclosing customer information
obscurity - Answer-signe wants to improve the security of the small business where she
serves as a security manager. she determines that the business needs to do a better
job of not revealing the type of computer, operating system, software, and network
connections they use. what security principle does signe want to use
with Correct Answers
us Patriot act - Answer-purpose is to strengthen domestic security and broaden the
powers of law enforcement agencies with regards to identifying and stopping terrorists
Americans with disabilities - Answer-standards created to require accessibility of
electronic media websites software applications, operating systems, video, etc.
computer security act - Answer-created 2 improve the security and privacy of sensitive
information and to create acceptable security practices
FERPA - Answer-created to protect the privacy of student records
the children's online act - Answer-an act created to help protected children under the
age of 13 from exploitation by governing the online collection of the child's personal
information
Gramm-Leach-Bliley Act - Answer-requires Banks and financial institutions to alert
customers of their policies and practices in disclosing customer information
exploit kit - Answer-Script kiddies acquire which item below from other attackers to
easily craft an attack:
Sarbanes-Oxley Act - Answer-created for corporate governance and financial practice
payment-card industry act - Answer-defines minimum requirements for merchants and
service providers to protect cardholder data
difficulties: human error, contamination, not knowing policy, live operations - Answer-
what are some key things people need to know about how to handle evidence related to
different types of disputes civil, criminal, private? what makes this difficult at times
security administrator - Answer-Ian recently earned his security certification and has
been offered a promotion to a position that requires him to analyze and design security
solutions as well as identifying users knees. which of these generally recognized
security positions has in been offered
Misconfiguration - Answer-alyona has been asked by her supervisor to give a
presentation regarding reasons why security attacks continue to be successful. she has
decided to focus on the issue of widespread vulnerabilities. which of the following would
a alyona not include in her presentation
, vulnerable business processes - Answer-Tatiana is discussing with her supervisor
potential reasons why a recent attack was successful against one of their systems.
which of the following configuration issues would not covered
security and convenience are inversely proportional - Answer-adone is attempting to
explain to his friend the relationship between security and convenience. which of the
following statements would he use
when two concurrent threads of execution access a shared resource simultaneously
resulting in unintended consequences - Answer-what is a race condition
confidentiality - Answer-which of the following ensures that only authorized parties can
view protected information
greater sophistication of defense tools - Answer-which of the following is not a reason
why it is difficult to defend against today's attacks
purposes - Answer-which of the following is not a successive layer in which information
security is achieved
through products, people, and procedures on the devices that store, manipulate, and
transmit the information - Answer-complete this definition of information security. that
which protects the integrity confidentiality and availability of information
security is a war that must be won at all cost - Answer-which of the following is not true
regarding security
information - Answer-which of the following is an Enterprise critical asset
extinguish risk - Answer-Gunner is creating a document that explains risk response
techniques which of the following would he not list and explain in his document
diversity - Answer-an organization that practices purchasing products from different
vendors is demonstrating which security principle
to spy on citizens - Answer-What is an objective of state-sponsored attackers?
Gramm-Leach-Bliley Act (GLBA) - Answer-which act requires Banks and financial
institutions to alert their customers of their policies in disclosing customer information
obscurity - Answer-signe wants to improve the security of the small business where she
serves as a security manager. she determines that the business needs to do a better
job of not revealing the type of computer, operating system, software, and network
connections they use. what security principle does signe want to use