Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
According to the CNSS, networking is "the protection of information and its critical elements." _________________________
Free
(True/False)
4.8/5
(37)
Correct Answer:
False - information security
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects. _________________________
Free
(True/False)
4.9/5
(37)
Correct Answer:
False - accuracy
__________ was the first operating system to integrate security as one of its core functions.
Free
(Multiple Choice)
5.0/5
(34)
Correct Answer:
C
A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.
(Multiple Choice)
4.9/5
(39)
A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.
(Short Answer)
4.8/5
(22)
The investigation phase of the SDLC involves specification of the objectives, constraints, and
scope of the project.
(True/False)
4.8/5
(37)
Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
(True/False)
5.0/5
(37)
A(n) hardware system is the entire set of people, procedures, and technology that enable business to use information. _________________________
(True/False)
4.8/5
(27)
To achieve balance-that is, to operate an information system that satisfies the user and the security professional-the security level must allow reasonable access, yet protect against threats.
(True/False)
4.9/5
(34)
The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.
(Short Answer)
4.8/5
(38)
A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in project management and information security technical requirements.
(True/False)
4.8/5
(34)
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
(Multiple Choice)
4.8/5
(39)
The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.
(True/False)
4.7/5
(36)
A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.
(Short Answer)
4.8/5
(38)
Key end users should be assigned to a developmental team, known as the united application development team. _________________________
(True/False)
4.8/5
(35)
A breach of possession may not always result in a breach of confidentiality.
(True/False)
4.8/5
(45)
During the ____________________ phase of the systems life cycle, the process begins by examining the
event or plan that initiated the process. During this phase, the objectives, constraints, and scope of the project are specified.
(Short Answer)
5.0/5
(35)
When a computer is the subject of an attack, it is the entity being attacked.
(True/False)
4.9/5
(35)
Describe the multiple types of security systems present in many organizations.
(Essay)
4.9/5
(40)
The ____________________ component of an information system comprises applications, operating systems, and assorted command utilities.
(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)