Quick Answer: Which of the following security component ensures that only authorized parties can view information?

Which of the these protections ensures that only authorized parties can view information?

Three protections must be incorporated over information. They are confidentiality, integrity and availability. Confidentiality makes sure that only approved people can view important information.

Which of the three protections ensures that only authorized parties can view information *?

Confidentiality is the answer.

Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?

Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it? Health Insurance Portability and Accountability Act (HIPAA).

Which Act requires banks and financial institutions to alert their customers of their policies?

Gramm-Leach-Bliley (GLBA) demands that banks and financial institutions should notify customers about their policies in revealing customer information and to safeguard all electronic and paper documents holding personally identifiable financial information. Hence option (b) is the correct answer.

THIS IS IMPORTANT:  How do I know if I have Malwarebytes on my computer?

What ensures that data is accessible to authorized users?

Confidentiality. Ensures that data is accessed only by authorized users with the proper credentials.

Which of the following ensures that information is correct and no unauthorized person or malicious software has altered it?

integrity. Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.

Which is a type of virus that infects an executable program file?

File Virus

File viruses are commonly found in executable files such as .exe, . vbs or a .com files. If you run an executable file that is infected with a file virus, it can potentially enter your computer’s memory and subsequently run your computer.

Is a flaw or weakness that allows a threat agent to bypass security?

Chapter 1

Term Definition
threat liklihood the probability that a threat will actually occur
threat vector the means by which an attack could occur
transference transferring the risk to a third party
vulnerability a flaw or weakness that allows a threat agent to bypass security.

Why are long passwords stronger than short passwords?

Why are long passwords stronger than short passwords? Long passwords are confusing to attackers who cannot read them. Short passwords take up less storage space which makes them easier to break. Long passwords require attackers to make many more attempts to uncover the password.

Which ensures that only authorized parties can modify data?

Authorization and authentication are not required for an entity to access unprotected resources. … This ensures that only authorized users can modify data. Confidentiality, or data privacy: The means used to ensure that information is made available only to users who are authorized to access it.

THIS IS IMPORTANT:  Can Swann security cameras be hacked?

What is it called when a user makes a typing error when entering a URL that takes him to an imposter website?

what is it called when a user makes a typing error when entering a URL that takes him to an imposter website? Typo squatting.

How can an attacker use a hoax quizlet?

How can an attacker use a hoax? By sending out a hoax, an attacker can convince a user to read his email more often. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. A user who receives multiple hoaxes could contact his supervisor for help.