100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Principles of Information Security 7th Edition by Whitman and Mattord $17.99   Add to cart

Exam (elaborations)

Principles of Information Security 7th Edition by Whitman and Mattord

 9 views  0 purchase
  • Course
  • Institution
  • Book

Principles of Information Security 7th Edition by Whitman and Mattord

Preview 2 out of 7  pages

  • September 6, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
TEST BANK For Principles of Information Security 7th
Edition by Whitman and Mattord


In information security, what can constitute a loss? - ANSWER: theft of information


a delay in transmitting information that results in a financial penalty


the loss of good will or a reputation

In information security, which of the following is an example of a threat actor? -
ANSWER: a force of nature such as a tornado that could destroy computer
equipment


a virus that attacks a computer network


a person attempting to break into a secure computer network

In what kind of attack can attackers make use of millions of computers under their
control in an attack against a single server or network? - ANSWER: distributed

Select the information protection item that ensures that information is correct and
that no unauthorized person or malicious software has altered that data. - ANSWER:
integrity

To date, the single most expensive malicious attack occurred in 2000, which cost an
estimated $8.7 billion. What was the name of this attack? - ANSWER: Love Bug

Under which laws are health care enterprises required to guard protected health
information and implement policies and procedures whether it be in paper or
electronic format? - ANSWER: HIPAA

What class of attacks use innovative attack tools and once a system is infected it
silently extracts data over an extended period? - ANSWER: Advanced Persistent
Threat

What level of security access should a computer user have to do their job? -
ANSWER: least amount

What process describes using technology as a basis for controlling the access and
usage of sensitive data? - ANSWER: technical controls

, What term best describes any premeditated, politically motivated attack against
information, computer systems, computer programs, and data which results in
violence against noncombatant targets by subnational groups or clandestine agents?
- ANSWER: cyberterrorism

What term describes a layered security approach that provides the comprehensive
protection? - ANSWER: defense-in-depth

What term is used to describe a group that is strongly motivated by ideology, but is
usually not considered to be well-defined and well-organized? - ANSWER: hactivists

What term is used to describe state-sponsored attackers that are used for launching
computer attacks against their foes? - ANSWER: nation state actors

What term refers to an action that provides an immediate solution to a problem by
cutting through the complexity that surrounds it? - ANSWER: silver bullet

What type of theft involves stealing another person's personal information, such as a
Social Security number, and then using the information to impersonate the victim,
generally for financial gain? - ANSWER: identity theft

Which law requires banks and financial institutions to alert customers of their
policies and practices in disclosing customer information? - ANSWER: Gramm-Leach-
Bliley

Which of the following are considered threat actors? (Choose all that apply.) -
ANSWER: brokers


competitors

Which of the following describes various supporting structures for implementing
security that provides a resource of how to create a secure IT environment? (Choose
all that apply.) - ANSWER: reference architectures


industry-standard frameworks

Which of the following ensures that data is accessible to authorized users? -
ANSWER: availability

Which of the following is a common security framework? (Choose all that apply.) -
ANSWER: ISO


COBIT

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller kushboopatel6867. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

84251 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart