Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

According to the CNSS, networking is "the protection of information and its critical elements." _________________________

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

False - information security

Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects. _________________________

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False - accuracy

__________ was the first operating system to integrate security as one of its core functions.

Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
Verified

C

A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.

(Multiple Choice)
4.9/5
(39)

A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.

(Short Answer)
4.8/5
(22)

The investigation phase of the SDLC involves specification of the objectives, constraints, and scope of the project.

(True/False)
4.8/5
(37)

Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.

(True/False)
5.0/5
(37)

A(n) hardware system is the entire set of people, procedures, and technology that enable business to use information. _________________________

(True/False)
4.8/5
(27)

To achieve balance-that is, to operate an information system that satisfies the user and the security professional-the security level must allow reasonable access, yet protect against threats.

(True/False)
4.9/5
(34)

The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.

(Short Answer)
4.8/5
(38)

A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in project management and information security technical requirements.

(True/False)
4.8/5
(34)

A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.

(Multiple Choice)
4.8/5
(39)

The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.

(True/False)
4.7/5
(36)

A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.

(Short Answer)
4.8/5
(38)

Key end users should be assigned to a developmental team, known as the united application development team. _________________________

(True/False)
4.8/5
(35)

A breach of possession may not always result in a breach of confidentiality.

(True/False)
4.8/5
(45)

During the ____________________ phase of the systems life cycle, the process begins by examining the event or plan that initiated the process. During this phase, the objectives, constraints, and scope of the project are specified.

(Short Answer)
5.0/5
(35)

When a computer is the subject of an attack, it is the entity being attacked.

(True/False)
4.9/5
(35)

Describe the multiple types of security systems present in many organizations.

(Essay)
4.9/5
(40)

The ____________________ component of an information system comprises applications, operating systems, and assorted command utilities.

(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)