1. Each of the following factors illustrates why information security is increasingly difficult except _______. a. faster computer processors b. growing sophistication of attacks c. faster detection of weaknesses d. distributed attacks
2. A type of software that repairs security flaws in an application is called a(n) _____. a. hot fix b. exploit c. repair d. patch
3. The primary goal of information security is to protect __________. a. procedures b. people c. information d. products
4. Each of the following is a characteristic of information except ________. a. integrity b. confidentiality c. conformity d. availability
5. Each of the following is intended to protect information except _________. a. people b. policies c. equipment d. confidentiality
6. Information security procedures tell the people how to use products to protect information. True or false?
7. Hackers now use protocols such as the Hypertext Transfer Protocol (HTTP) to send data or commands to attack computers, making it difficult to distinguish an attack from legitimate network traffic. True or false?
8. The theft of data is the least significant cause of financial loss due to a security breach. True or false?
9. Integrity ensures that information is correct and that no unauthorized person or malicious software program can or has altered that data. True or false?
10. Attackers can now use hundreds or thousands of computers in an attack against a single computer or network, making it impossible to stop an attack by identifying and blocking the source. True or false?
11. While most attacks today take advantage of vulnerabilities that someone has already uncovered, a(n) _____ occurs when a hacker discovers and exploits a previously unknown flaw. day zero attack
12. _____ involves assuring that only authorized parties can view information. Confidentiality
13. Under the _____, healthcare enterprises must guard