100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Principles of information security midterm questions and answers with solutions.

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
31-05-2025
Written in
2024/2025

Principles of information security midterm questions and answers with solutions.

Institution
FITSP
Course
FITSP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
FITSP
Course
FITSP

Document information

Uploaded on
May 31, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Principles of information security midterm questions
and answers with solutions

In information security, what can constitute a loss? - ANSWER theft of information




a delay in transmitting information that results in a financial penalty




the loss of good will or a reputation



In information security, which of the following is an example of a threat actor? - ANSWER a
force of nature such as a tornado that could destroy computer equipment




a virus that attacks a computer network




a person attempting to break into a secure computer network



In what kind of attack can attackers make use of millions of computers under their control in an
attack against a single server or network? - ANSWER distributed



Select the information protection item that ensures that information is correct and that no
unauthorized person or malicious software has altered that data. - ANSWER integrity

, To date, the single most expensive malicious attack occurred in 2000, which cost an estimated
$8.7 billion. What was the name of this attack? - ANSWER Love Bug



Under which laws are health care enterprises required to guard protected health information
and implement policies and procedures whether it be in paper or electronic format? - ANSWER
HIPAA



What class of attacks use innovative attack tools and once a system is infected it silently extracts
data over an extended period? - ANSWER Advanced Persistent Threat



What level of security access should a computer user have to do their job? - ANSWER least
amount



What process describes using technology as a basis for controlling the access and usage of
sensitive data? - ANSWER technical controls



What term best describes any premeditated, politically motivated attack against information,
computer systems, computer programs, and data which results in violence against
noncombatant targets by subnational groups or clandestine agents? - ANSWER cyberterrorism



What term describes a layered security approach that provides the comprehensive protection? -
ANSWER defense-in-depth



What term is used to describe a group that is strongly motivated by ideology, but is usually not
considered to be well-defined and well-organized? - ANSWER hactivists



What term is used to describe state-sponsored attackers that are used for launching computer
attacks against their foes? - ANSWER nation state actors

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Performance Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
319
Member since
1 year
Number of followers
36
Documents
15290
Last sold
1 day ago

Get everything you need to ace your classes in one place. We offer instant downloads of test banks, easy-to-read study guides, step-by-step homework help, and sample research papers to save you hours of work. Whether you're prepping for a big final or stuck on a tough assignment, our resources give you the exact shortcuts and practice you need to boost your grades fast. Stop stressing and get the competitive edge you need to succeed right now

Read more Read less
4.4

217 reviews

5
128
4
60
3
19
2
4
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions