Reference no: EM132181620
What NIST special publication 800 covers Bluetooth security?
a. 800-83 Rev. 1
b. 800-94 Rev. 1
c. 800-121 Rev. 1
d. 800-88 Rev. 1
This organization was formed in 1906 to address issues with expanding technologies related to electrical devices.
a. IEC
b. RFC
c. IEEE
d. IETF
An alternative method used to document operational specifications is known as:
a. Standard
b. Request for comments
c. Best current practice
d. Draft standard
When dealing with IEEE 802 standards, what standard covers radio regulatory?
a. 802.11
b. 802.16
c. 802.3
d. 802.18
What standards institute was formed with the merger of five engineering societies and three government agencies?
a. ANSI
b. IEEE
c. ISO
d. ETSI
ISO17799 has 10 major sections. Name five of them.
You are building out a share drive and want to ensure that it is always accessible. What is your primary focus?
a. Availability
b. Privacy
c. Integrity
d. Confidentiality
A formal method of identifying and classifying risk is known as...
a. Security policy
b. Risk assessment
c. Access control
d. Asset management
Which industry is concerned with credit card payments?
a. PCI DSS
b. Visa
c. IEC 27002
d. American Express
Which law and information security concept is concerned with integrity?
a. PCI DDS v 3.1
b. CIPA
c. SOX
d. GLBA
Your company has been fined for a breach in security, and the fine will be $1.5 million/year. Which law did you break?
a. SOX
b. IEEE
c. HIPAA
d. PCI DDS
George W. Bush called this act the most far-reaching reforms for American business practices. Which act is he referring to?
a. GLBA
b. SOX
c. HIPAA
d. CIPA
This act made DHS responsible for developing and ensuring federal government-wide compliance.
a. HIPAA
b. NIST
c. FISMA
d. SOX
HIPAA also applies to the ______________ of covered entities.
What regulation was released to provide a catchall update to HIPAA and HITECH act rulings?
a. Omnibus
b. Gramm-Leach
c. EPHI
d. OCR
What addresses the privacy and security of consumer financial information?
a. CIPA
b. SOX
c. GLBA
d. FISMA
Internal controls and information security goals have steps that must be taken. What step has the goal of confidentiality?
a. Reports are maintained for the maximum allowable time.
b. Unauthorized acquisition or use of data or assets that could affect financial statements.
c. Financial reports, records, and data are accurately maintained.
d. Transactions are prepared according to GAAP rules.
What layer of the OSI model is concerned with process to process communication?
a. Network
b. Presentation
c. Session
d. Data link
A statement of management direction is known as...
a. Security policy
b. Risk assessment
c. Standards
d. Personnel security
Which NIST covers computer security incident handling?
a. 800-61 Rev. 1
b. 800-61
c. 800-Rev. 3
d. 800-61 Rev. 2