Authorized parties can view information
Anonymous Quiz
71%
Confidentiality
17%
Integrity
9%
Scalability
3%
None
Using additive Caesar cipher with key=10 to encrypt "hello" we get "ROVVY"
Anonymous Quiz
85%
True
15%
False
Cryptography is the science and art of transforming messages to make them secure ammune to attack
Anonymous Quiz
90%
True
10%
False
a replay attack makes a copy of the transmission for use at a later time
Anonymous Quiz
98%
True
2%
False
threat agent is a person or thing that has the power to carry out a threat
Anonymous Quiz
89%
True
11%
False
Each of the following is a reason it is difficult to defend against today’s attackers except ……….. .
Anonymous Quiz
58%
complexity of attack tools
18%
weak patch distribution
7%
greater sophistication of attacks
17%
delays in patching software products
. In a general sense, “security” is ……………… .
Anonymous Quiz
7%
protection from only direct actions
83%
the necessary steps to protect a person or property from harm
3%
only available on hardened computers and systems
7%
using reverse attack vectors (RAV) for protection
By definition, a(n) ……… is a person or thing that has the power to carry out a threat. .
Anonymous Quiz
12%
vulnerability
14%
exploit
69%
threat agent
5%
risk
The ……….. requires that enterprises must guard protected health information and implement
policies and procedures to safeguard it.
policies and procedures to safeguard it.
Anonymous Quiz
44%
Hospital Protection and Insurance Association Agreement (HPIAA)
7%
Sarbanes-Oxley Act (Sarbox)
8%
Gramm-Leach-Bliley Act (GLBA)
41%
Health Insurance Portability and Accountability Act (HIPAA)
An organization that purchased security products from different vendors is demonstrating
which security principle?
which security principle?
Anonymous Quiz
57%
diversity
13%
limiting
25%
obscurity
5%
layering
Each of the following can be classified as an “insider” except …….. .
Anonymous Quiz
8%
business partners
15%
employees
3%
contractors
73%
cybercriminals
An example of a(n) ………….. is a software defect in an operating system that allows an
unauthorized user to gain access to a computer without a password.
unauthorized user to gain access to a computer without a password.
Anonymous Quiz
16%
threat agent
10%
threat
62%
vulnerability
11%
asset exploit (AE)