with 100% Correct Answers | Latest
Update
according to the US bureau of labor statistics, what percentage of growth is
the available job outlook supposed to reach by the end of the decade -
🧠ANSWER ✔✔18
what information security position reports to the ciso and supervises
technicians, administrators, and security staff? - 🧠ANSWER ✔✔manager
Which position below is considered an entry-level position for a person who
has the necessary technical skills? - 🧠ANSWER ✔✔security technician
what country is now the number one source of attack traffic? - 🧠ANSWER
✔✔Indonesia
,What kind of server connects a remote system through the Internet to local
serial ports using TCP/IP? - 🧠ANSWER ✔✔serial server
in what kind of attack can attackers make use of hundreds of thousands of
computers under their control in an attack against a single server or
Network - 🧠ANSWER ✔✔distributed
Which term below is frequently used to describe the tasks of securing
information that is in a digital format? - 🧠ANSWER ✔✔information security
the security protection item that ensures that the individual is who they
claim to be the authentic or genuine person and not and an imposter is
known as - 🧠ANSWER ✔✔authentication
which of the three protections ensures that only authorized parties can view
information - 🧠ANSWER ✔✔confidentiality
select below the information protection item that ensures that information is
correct and that no unauthorized person or malicious software has altered
that data - 🧠ANSWER ✔✔integrity
what type of theft involves stealing another person's personal information,
such as a social security number, and then using the information to
, impersonate the victim, generally for financial gain? - 🧠ANSWER
✔✔identity theft
in information security, what constitutes a loss? - 🧠ANSWER ✔✔all all of
the above
to date, the single most expensive malicious attack occurred in 2000, which
cost an estimated 8.7 billion dollars. what was the name of the attack? -
🧠ANSWER ✔✔love bug
What term is used to describe a loose network of attackers, identity thieves,
and financial fraudsters? - 🧠ANSWER ✔✔Cybercriminals
Select below the term that is used to describe individuals who want to
attack computers yet lack the knowledge of computers and networks
needed to do so - 🧠ANSWER ✔✔script kiddies
healthcare enterprises are required to guard protected health information
and implement policies and procedures whether it be in paper or electronic
format - 🧠ANSWER ✔✔HIPAA
purpose is to strengthen domestic security and broaden the powers of law
enforcement agencies with regards to identifying and stopping terrorists -
🧠ANSWER ✔✔us Patriot act
3
COPYRIGHT©JOSHCLAY 2025/2026. YEAR PUBLISHED 2025. COMPANY REGISTRATION NUMBER: 619652435. TERMS OF USE. PRIVACY
STATEMENT. ALL RIGHTS RESERVED