ANSWERS
18 - ANSWER according to the US bureau of labor statistics, what percentage of
growth is the available job outlook supposed to reach by the end of the decade
manager - ANSWER what information security position reports to the ciso and
supervises technicians, administrators, and security staff?
security technician - ANSWER Which position below is considered an entry-level
position for a person who has the necessary technical skills?
Indonesia - ANSWER what country is now the number one source of attack traffic?
serial server - ANSWER What kind of server connects a remote system through the
Internet to local serial ports using TCP/IP?
distributed - ANSWER in what kind of attack can attackers make use of hundreds of
thousands of computers under their control in an attack against a single server or
Network
information security - ANSWER Which term below is frequently used to describe the
tasks of securing information that is in a digital format?
authentication - ANSWER the security protection item that ensures that the individual is
who they claim to be the authentic or genuine person and not and an imposter is known
as
confidentiality - ANSWER which of the three protections ensures that only authorized
parties can view information
integrity - ANSWER select below the information protection item that ensures that
information is correct and that no unauthorized person or malicious software has altered
that data
identity theft - ANSWER what type of theft involves stealing another person's personal
information, such as a social security number, and then using the information to
impersonate the victim, generally for financial gain?
all all of the above - ANSWER in information security, what constitutes a loss?
love bug - ANSWER to date, the single most expensive malicious attack occurred in
2000, which cost an estimated 8.7 billion dollars. what was the name of the attack?
, Cybercriminals - ANSWER What term is used to describe a loose network of attackers,
identity thieves, and financial fraudsters?
difficulties: human error, contamination, not knowing policy, live operations - ANSWER
what are some key things people need to know about how to handle evidence related to
different types of disputes civil, criminal, private? what makes this difficult at times
security administrator - ANSWER Ian recently earned his security certification and has
been offered a promotion to a position that requires him to analyze and design security
solutions as well as identifying users knees. which of these generally recognized
security positions has in been offered
Misconfiguration - ANSWER alyona has been asked by her supervisor to give a
presentation regarding reasons why security attacks continue to be successful. she has
decided to focus on the issue of widespread vulnerabilities. which of the following would
a alyona not include in her presentation
vulnerable business processes - ANSWER Tatiana is discussing with her supervisor
potential reasons why a recent attack was successful against one of their systems.
which of the following configuration issues would not covered
security and convenience are inversely proportional - ANSWER adone is attempting to
explain to his friend the relationship between security and convenience. which of the
following statements would he use
when two concurrent threads of execution access a shared resource simultaneously
resulting in unintended consequences - ANSWER what is a race condition
confidentiality - ANSWER which of the following ensures that only authorized parties
can view protected information
greater sophistication of defense tools - ANSWER which of the following is not a
reason why it is difficult to defend against today's attacks
purposes - ANSWER which of the following is not a successive layer in which
information security is achieved
through products, people, and procedures on the devices that store, manipulate, and
transmit the information - ANSWER complete this definition of information security. that
which protects the integrity confidentiality and availability of information
security is a war that must be won at all cost - ANSWER which of the following is not
true regarding security
information - ANSWER which of the following is an Enterprise critical asset