The demand for IT professionals who know how to secure networks and computers is an an all time low.
False
The COMPTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in an IT administration, with focus on security.
True
Attack toolkits range in price from only $400 to as much as $8000.
False
Like a virus, a worm needs the user to perform an action such as starting a program os opening an email attachment to start the infection.
False
Roming a rootkit from an infected computer is extremely difficult.
True
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
True
A study by Foote Partners showed that security certifications earn employees ___ percent more pay than their uncertified counterparts
10-14%
The position of ____ is generally an entry-level position for a person who has the necessary technical skills.
Security Tech
____ attacks are responsible for half of all malware delivered by Web advertising.
Fake antivirus
In a ____ attack, attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
Information security
____ ensures that only authorized parties can view information.
Confidentiality
____ ensures that information is correct and that no unauthorized person or malicious software has altered that data.
Integrity
____ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
Authentication
In information security, an example of a threat agent can be ____.
Both A and B
Under the ____, health care enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
HIPPA
The ____ Act requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
Gramm-leach-bliley
What is another name for unsolicited e-mail messages?
Span
The two types of malware that have the primary objective of spreading are ____.
Viruses and worms
A computer ____ is malicious computer code that reproduces itself on the same computer.
Virus
In a(n) ____ infection, a virus injects itself into the program’s executable code instead of at the end of the file.
Swiss cheese
Unlike other malware, a ____ is heavily dependent upon the user for its survival.
Virus
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
A ____ virus infects program executable files.
Program
There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program
Companion
A ____ is a program advertised as performing one activity but actually does something else.
Trojan
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event
Logic bomb
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
____ involves horizontally separating words, although it is still readable by the human eye.