Chapter 1 ■ Security and Risk Management (Domain 1) 7
- Mary is helping a computer user who sees the following message appear on his computer
screen. What type of attack has occurred?
A. Availability
B. Confidentiality
C. Disclosure
D. Distributed
- Which one of the following organizations would not be automatically subject to the terms
of HIPAA if they engage in electronic transactions?
A. Healthcare provider
B. Health and fitness application developer
C. Health information clearinghouse
D. Health insurance plan - John’s network begins to experience symptoms of slowness. Upon investigation, he realizes
that the network is being bombarded with TCP SYN packets and believes that his organi-
zation is the victim of a denial of service attack. What principle of information security is
being violated?
A. Availability
B. Integrity
C. Confidentiality
D. Denial