Security & IntelligenceAnswer Key

Legal And Privacy Issues In Information Security

61 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Information

ANSWER

An organizations most important asset

QUESTION 2

Information Security

ANSWER

The study and practice of protecting information

QUESTION 3

Cryptography

ANSWER

Practice of hiding information so unauthorized persons can't read it

QUESTION 4

Confidentiality

ANSWER

Only people with the right permission can access and use information

QUESTION 5

Integrity

ANSWER

Information systems and their data are correct

QUESTION 6

Availability

ANSWER

The security goal of making information systems operate reliably.

QUESTION 7

DoS

ANSWER

Disrupts information systems so they're no longer available to users

QUESTION 8

User Domain

ANSWER

Any users of an organizations IT system. AKA End users

QUESTION 9

Workstation Domain

ANSWER

Computing devices used by end users

QUESTION 10

LAN Domain

ANSWER

Organizations LAN technologies

QUESTION 11

WAN Domain

ANSWER

Organizations with remote locations connect to this

QUESTION 12

Remote access Domain

ANSWER

Process and procedures that end users use to access the organizations IT infrastructure and data.

QUESTION 13

System/Application Domain

ANSWER

Equipment and data an organization uses to support its' IT infrastructure.

QUESTION 14

Separation of duties

ANSWER

When 2 or more employees split critical task functions

QUESTION 15

Patch

ANSWER

Software or code that updates a program to address security problems

QUESTION 16

Exploit

ANSWER

Successful attacks against a vulnerability

QUESTION 17

Zero-Day Vulnerability

ANSWER

Exploited before a patch is provided

QUESTION 18

Threat

ANSWER

Anything that can harm an information system

QUESTION 19

Risk

ANSWER

The likelihood that a threat will exploit a vulnerability and cause harm

QUESTION 20

Least privilege

ANSWER

Systems run with the lowest amount of permissions needed to complete tasks.

QUESTION 21

Need to know

ANSWER

Allows access to only needed data

QUESTION 22

Logic bomb

ANSWER

Lies dormant for a certain period and when conditions are met it carries out its malicious function.

QUESTION 23

Industry sector

ANSWER

Group of organizations that share a similar industry type.

QUESTION 24

U.S. Freedom of Information Act

ANSWER

Governs access to public records of the U.S. federal government

QUESTION 25

Tort

ANSWER

Wrongful act or harm that hurts a person

QUESTION 26

Defamation

ANSWER

Maliciously saying false things about another person

QUESTION 27

Web Beacon

ANSWER

Small, invisible electronic file that is placed on a web page or in an e-mail message that monitors behavior

QUESTION 28

Preemption

ANSWER

The legal concept that means a higher-ranking law will exclude a lower-ranking law on the same subject

QUESTION 29

Federalism

ANSWER

Describes the relationship between the states and the U.S. federal government.

QUESTION 30

Civil procedure

ANSWER

Claims between individuals

QUESTION 31

Criminal procedure

ANSWER

Wrongs against society

QUESTION 32

Compliance

ANSWER

The action of following applicable laws and rules and regulations

QUESTION 33

Audit

ANSWER

An evaluation and verification that certain objectives are met

QUESTION 34

The Bank Secrecy Act/Currency and Foreign Transactions Reporting Act

ANSWER

Congress created this law to fight drug trafficking, money laundering, and other crimes.

QUESTION 35

The Gramm-Leach-Bliley Act

ANSWER

Defines any financial institution as any institution that conducts financial activities.

QUESTION 36

The Federal Reserve (The Fed)

ANSWER

Central bank of the U.S., reports directly to Congress.

QUESTION 37

The Federal Deposit Insurance Corporation

ANSWER

Provides deposit insurance to banks

QUESTION 38

The Fair Credit Reporting Act

ANSWER

Allows consumers to opt out of some types of information sharing

QUESTION 39

Pretexting

ANSWER

Attempt to gain access to customer information without proper authority to do so

QUESTION 40

The Childrens Online Privacy Act

ANSWER

Governs how information from children is to be collected and used

QUESTION 41

The Childrens Internet Protection Act

ANSWER

Protects minors from obscene or objectionable material on school or library computers

QUESTION 42

The Family Educational Rights and Privacy Act

ANSWER

Protects the privacy rights of students and their educational records

QUESTION 43

Health Insurance Portability and Accountability Act (HIPAA)

ANSWER

Fights health insurance fraud, simplifies how health insurance is administered.

QUESTION 44

Office for Civil Rights

ANSWER

Enforces HIPAA Privacy and Security Rules

QUESTION 45

The Sarbanes-Oxley Act

ANSWER

Protects shareholders and investors from financial fraud.

QUESTION 46

ISO/IEC 27002

ANSWER

Lists 14 sections of information security safeguards.

QUESTION 47

National Institute of Standards and Technology (NIST)

ANSWER

Creates information security guidance for federal agencies.

QUESTION 48

Federal Information Security Management Act (FISMA)

ANSWER

Protects federal IT systems and the data in those systems

QUESTION 49

Category 0

ANSWER

Exercise/Network testing. Internal network testing

QUESTION 50

Category 1

ANSWER

Unauthorized access. Must be reported to their IT systems even if data is not compromised

QUESTION 51

Category 2

ANSWER

Denial of Service. Must report successful attacks that harm IT systems

QUESTION 52

Category 3

ANSWER

Malicious Code. Must report successful installation of software.

QUESTION 53

Category 4

ANSWER

Improper use. Must report violations of their acceptable use policies.

QUESTION 54

Category 5

ANSWER

Scans, probes, and Attempted Access. Must report any activities that seek to access or identify IT systems.

QUESTION 55

Category 6

ANSWER

Investigation. Unusual events that require more review due to being odd or potentially harmful.

QUESTION 56

Must be protected per PCI DSS requirements

ANSWER

An e-commerce Web server

QUESTION 57

Fair and Accurate Transaction Act

ANSWER

Enacted by Congress in response to growth in identity theft crime

QUESTION 58

Main goal of information security

ANSWER

CIA

QUESTION 59

U.S. Supreme Court justices

ANSWER

Are nominated by the president

QUESTION 60

The U.S. Cabinet consists of

ANSWER

The vice president and the heads of the 15 executive departments

QUESTION 61

Source of legal authority for the U.S government

ANSWER

The U.S. Constitution

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials