Question

1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of...

1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.

Select one:

True

False

2)Which term below is frequently used to describe the tasks of securing information that is in a digital format?

Select one:

a. network security

b. information security

c. logical security

d. physical security

3) The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

Select one:

a. Gramm-Leach-Bliley

b. California Database Security Breach

c. Sarbanes-Oxley

d. USA Patriot

4)In information security, what constitutes a loss?

Select one:

a. theft of information

b. all of the above

c. a delay in transmitting information that results in a financial penalty

d. the loss of good will or a reputation

5)In information security, an example of a threat agent can be ____.

Select one:

a. a force of nature such as a tornado that could destroy computer equipment

b. a virus that attacks a computer network

c. All of the above

d. A person attempting to break into a secure computer network

6) Which position below is considered an entry-level position for a person who has the necessary technical skills?

Select one:

a. security administrator

b. security technician

c. CISO

d. security manager

7) Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?

Select one:

a. $500,000

b. $100,000

c. $1,500,000

d. $250,000

8) Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.

Select one:

True

False

9) What kind of server connects a remote system through the Internet to local serial ports using TCP/IP?

Select one:

a. Serial server

b. Remote Access Server

c. HTTP server

d. VPN server

10) Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

Select one:

a. USHIPA

b. HLPDA

c. HIPAA

d. HCPA

0 0
Add a comment Improve this question Transcribed image text
Request Professional Answer

Request Answer!

We need at least 10 more requests to produce the answer.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the answer will be notified once they are available.
Know the answer?
Add Answer to:
1)The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • 8:38 A software developer wants to ensure that the application is verifying that a key is...

    8:38 A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet. Which of the following should be used in the code? (Select TWO.) A. Escrowed keys B. SSL symmetric encryption key C. Software code private key D. Remote server public key A Chief Information Security Officer (CISO) for a school district wants to enable SSL to protect all of the public-facing servers in...

  • ONLY REALISTIC ANSWERS PLS QUESTION: 21 A newly hired Chief Information Security Officer (CISO) is reviewing...

    ONLY REALISTIC ANSWERS PLS QUESTION: 21 A newly hired Chief Information Security Officer (CISO) is reviewing the organization’s security budget from the previous year. The CISO notices $100,000 worth of fines were paid for not properly encrypting outbound email messages. The CISO expects next year’s costs associated with fines to double and the volume of messages to increase by 100%. The organization sent out approximately 25,000 messages per year over the last three years. Given the table below: Security Product...

  • RSA is a common form of symmetric key encryption. Select one: True False What is the...

    RSA is a common form of symmetric key encryption. Select one: True False What is the purpose of a nonce in an end-point authentication protocol? Select one: a. It protects against replay attacks. b. It serves as a private key. c. It serves as a public key. d. It serves as a signature. e. It serves as a shared symmetric key. What is (19 * 16) mod 7? Answer: A TCP connection setup requires 3 messages to be passed. How...

  • Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

    Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates interstate and foreign telecommunications (amended in 1996 and 2001) Civil legal evidence Federal Rules for Civil Procedure (FRCP) 1938 As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings Freedom of information Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously...

  • 1. Which of the following commands will locate all of the program files on a computer...

    1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set? Select one: a. find / -type SUID b. find / -perm +4000 -type f c. find / -perm +SUID -type f d. find / -suid 2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs? Select one: a. TCP wrappers refuses to run and logs an error...

  • 1. Which of the following protocols is used by a client to send an email message?...

    1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...

  • answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT...

    answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT ONE): a)true b)false 2)Cross-site scripting attacks attempt to bypass the browsers security checks to gain elevated access privileges to sensitive data belonging to another site(SELECT ONE): a)true b)false. 3)Denial of service attacks target the confidentiality and integrity of a system or network.(SELECT ONE): a)true b)false 4)the wireless access point provides a connection to the network or service(SELECT ONE): a)true b)false 5)blocking ICMP packets may...

  • 1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost....

    1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost. C) making the system more efficient. D) making it impossible for unauthorized users to access the system. 2) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes...

  • #1) Select the best choice. For security controls, gap analysis involves comparing the present state of...

    #1) Select the best choice. For security controls, gap analysis involves comparing the present state of controls with a desired state of controls. At a minimum, common baseline security controls should be in place. Any gaps to various types of controls should be clearly documented, for example - "Information security responsibilities", which: a. Defines the program to provide initial and ongoing security education across the organization. b. Reduces risk from known vulnerabilities being exploited. c. Defines how staff will execute...

  • Cyber Security Question: A University is considering placing a smart television in each dorm room. One...

    Cyber Security Question: A University is considering placing a smart television in each dorm room. One exciting feature for this new television is that it uses voice control, with no control buttons on the television (other than an on/off button to turn the screen on and off). There is no remote control (so that you cannot lose it). The smart television is also connected to the campus Ethernet network. The television computer is always “on” to listen to the voices...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT