Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.
(Multiple Choice)
5.0/5
(38)
MULTICS stands for Multiple Information and Computing Service. _________________________
(True/False)
4.9/5
(38)
A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.
(Multiple Choice)
4.9/5
(39)
The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
(Short Answer)
4.9/5
(38)
____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
(Short Answer)
4.9/5
(38)
Organizations are moving toward more __________-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.
(Multiple Choice)
4.8/5
(36)
The water-ski model is a type of SDLC in which each phase of the process flows from the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.
(True/False)
4.8/5
(42)
A methodology and formal development strategy for the design and implementation of an information system is referred to as a __________.
(Multiple Choice)
4.7/5
(40)
A(n) ____________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.
(Short Answer)
4.9/5
(37)
The value of information comes from the characteristics it possesses.
(True/False)
4.9/5
(31)
When unauthorized individuals or systems can view information, confidentiality is breached. _________________________
(True/False)
4.8/5
(34)
An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization.
(Multiple Choice)
4.8/5
(40)
The bottom-up approach to information security has a higher probability of success than the top-down approach.
(True/False)
4.8/5
(41)
A computer is the ____________________ of an attack when it is the entity being targeted.
(Short Answer)
4.9/5
(34)
The ____________________ of information is the quality or state of ownership or control of some object or item.
(Short Answer)
4.7/5
(30)
During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
(Short Answer)
4.7/5
(27)
The possession of information is the quality or state of having value for some purpose or end.
(True/False)
4.8/5
(36)
__________ of information is the quality or state of being genuine or original.
(Multiple Choice)
4.9/5
(36)
The history of information security begins with the concept of ____________________ security.
(Short Answer)
4.7/5
(34)
Showing 21 - 40 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)