Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of two years experience in IT administration, with a focus on security.
|
True
|
|
The security protection item that ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter is known as?
|
Authentication
|
|
An example of a(n) ____________________ that information security must deal with is a software defect in an operating system that allows an unauthorized user to gain access to a computer without the user’s knowledge or permission.
|
Vulnerability
|
|
Under which law are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
|
HIPPA
|
|
What information security position reports to the CISO and supervises technicians, administrators, and security staff?
|
Manager
|
|
Proper ______ __________ involves identifying risks but making the decision to not engage in the activity.
|
Acceptance
|
|
Which position below is considered an entry level position for a person who has the necessary technical skills?
|
Security Technician
|
|
Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.
|
False
|
|
What term is used to describe a loose network of attackers, identity thieves, and financial fraudsters?
|
Cybercriminals
|
|
According to the U.S. Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade?
|
22
|