CyberSecurity - McMurtrey: Questions With
Applicable Solutions
Save
Practice questions for this set
Learn 1 /7 Study with Learn
black-hat hacker
Choose an answer
A __________ tries to break IT security and gain access to systems with no authorization, in
1
order to prove technical prowess.
With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a
2
WLAN NIC to a _____________.
What name is given to a U.S. federal law that requires U.S. government agencies to protect
3
citizens' private data and have proper security controls in place?
4 Connecting your computers or devices to the ________ immediately exposes them to attack.
Don't know?
Terms in this set (50)
, With wireless LANs Wireless access point (WAP)
(WLANs), radio transceivers
are used to transmit IP
packets from a WLAN NIC
to a _____________.
A ________ is a collection of Local area network (LAN)
computers connected to
one another or to a
common connection
medium.
A ___________ defines how a Disaster recovery plan (DRP)
business gets back on its
feet after a major disaster
like a fire or hurricane.
A ___________ gives priorities to Business continuity plan (BCP)
the functions an
organization needs to keep
going.
Connecting your Internet
computers or devices to
the ________ immediately
exposes them to attack.
The director of IT security is Workstation Domain
generally in charge of
ensuring that the ____________
conforms to policy.
The goal and objective of a Data classification standard
__________ is to provide a
consistent definition for
how an organization should
handle and secure different
types of data.
The requirement to keep Confidentiality
information private or
secret is the definition of
__________.