ITN 263 Chapter 1 – Flashcards

Unlock all answers in this set

Unlock answers
question
A security analyst is performing a security assessment. The analyst should not:
answer
take actions to mitigate a serious risk
question
True or False? Authentication is a security service that ensures information is reliably available
answer
False
question
True or False? The term "security theater" refers to security measures intended to make potential victims feel safe and secure without regard to their effectiveness.
answer
True
question
True or False? People can be threat agents in some cases but trustworthy in others.
answer
True
question
An attempt by a threat agent to exploit assets without permission is referred to as: A. an attack B. a trade-off C. a vulnerability D. a safeguard
answer
A. an attack
question
True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls motors, valves, and other devices in industrial applications
answer
True
question
When disclosing a security vulnerability in a system or software, the manufacturer should avoid: A. patching the system or software B. including enough detail to allow an attacker to exploit the vulnerability C. notifying customers D. all of the above
answer
B. including enough detail to allow an attacker to exploit the vulnerability
question
OCTAVE is a: A. type of layered defense B. risk-assessment process C. security architecture D. code of conduct
answer
B. risk-assessment process
question
True or False? A vulnerability is a security measure intended to protect an asset.
answer
False
question
A rational security decision, such as locking your vehicle when not in use, is an example of: A. reasoned paranoia B. the hunter's dilemma C. integrity D. none of the above
answer
A. reasoned paranoia
question
Supervisory control and data acquisition (SCADA) devices are most often associated with: A. retail stores B. universities C. utilities D. business offices
answer
D. utilities
question
True or False? Authentication is a security service that ensures information is reliably available.
answer
True
question
A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems, is a: A. cracker B. white-hat hacker C. black-hat hacker D. script kiddy
answer
B. white-hat hacker
question
Supervisory control and data acquisition (SCADA) devices are most often associated with: A. retail stores B. universities C. utilities D. business offices
answer
C. utilities
question
When you analyze a system using the six-phase security process, you are performing a: A. boundary analysis B. risk assessment C. plan-do-check-act cycle D. security architecture study
answer
B. risk assessment
question
CIA properties do not include: A. availability B. authentication C. integrity D. confidentiality
answer
A. availability
question
A security analyst is performing a security assessment. The analyst should not: A. securely erase all collected information that's not needed for business purposes B. take actions to mitigate a serious risk C. protect all working notes D. get written authorization from the organization to verify that the assessment should take place
answer
B. take actions to mitigate a serious risk
question
An attempt by a threat agent to exploit assets without permission is referred to as: A. a safeguard B. a vulnerability C. an attack D. a trade-off
answer
C. an attack
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New