Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.

(Multiple Choice)
5.0/5
(38)

MULTICS stands for Multiple Information and Computing Service. _________________________

(True/False)
4.9/5
(38)

A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.

(Multiple Choice)
4.9/5
(39)

The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.

(Short Answer)
4.9/5
(38)

____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.

(Short Answer)
4.9/5
(38)

Organizations are moving toward more __________-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.

(Multiple Choice)
4.8/5
(36)

The water-ski model is a type of SDLC in which each phase of the process flows from the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.

(True/False)
4.8/5
(42)

A methodology and formal development strategy for the design and implementation of an information system is referred to as a __________.

(Multiple Choice)
4.7/5
(40)

A(n) ____________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.

(Short Answer)
4.9/5
(37)

The value of information comes from the characteristics it possesses.

(True/False)
4.9/5
(31)

When unauthorized individuals or systems can view information, confidentiality is breached. _________________________

(True/False)
4.8/5
(34)

An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization.

(Multiple Choice)
4.8/5
(40)

The bottom-up approach to information security has a higher probability of success than the top-down approach.

(True/False)
4.8/5
(41)

A computer is the ____________________ of an attack when it is the entity being targeted.

(Short Answer)
4.9/5
(34)

The ____________________ of information is the quality or state of ownership or control of some object or item.

(Short Answer)
4.7/5
(30)

During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.

(Short Answer)
4.7/5
(27)

Information security can be an absolute.

(True/False)
4.9/5
(33)

The possession of information is the quality or state of having value for some purpose or end.

(True/False)
4.8/5
(36)

__________ of information is the quality or state of being genuine or original.

(Multiple Choice)
4.9/5
(36)

The history of information security begins with the concept of ____________________ security.

(Short Answer)
4.7/5
(34)
Showing 21 - 40 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)