Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Information has ____________________ when it is whole, complete, and uncorrupted.
(Short Answer)
4.8/5
(36)
People with the primary responsibility for administering the systems that house the information used by the organization perform the role of ____.
(Multiple Choice)
4.9/5
(35)
During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.
(Multiple Choice)
4.8/5
(37)
Of the two approaches to information security implementation, the top-down approach has a higher probability of success. _________________________
(True/False)
4.9/5
(39)
A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. _________________________
(True/False)
4.8/5
(40)
In the physical design phase, specific technologies are selected.
(True/False)
4.8/5
(41)
__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.
(Multiple Choice)
4.7/5
(32)
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
(True/False)
4.8/5
(36)
Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) _________.
(Short Answer)
4.8/5
(40)
SecOps focuses on integrating the need for the development team to provide iterative and
rapid improvements to system functionality and the need for the operations team to improve
security and minimize the disruption from software release cycles. _________________________
(True/False)
4.8/5
(32)
Using a methodology will usually have no effect on the probability of success.
(True/False)
4.9/5
(52)
The Analysis phase of the SDLC examines the event or plan that initiates the process and specifies the objectives, constraints, and scope of the project. _________________________
(True/False)
4.7/5
(37)
____________________ enables authorized users-people or computer systems-to access information without interference or obstruction and to receive it in the required format.
(Short Answer)
4.9/5
(41)
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
(True/False)
4.9/5
(44)
Which of the following is a valid type of role when it comes to data ownership?
(Multiple Choice)
4.9/5
(29)
E-mail spoofing involves sending an e-mail message with a harmful attachment.
(True/False)
4.9/5
(42)
In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures, and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
(Short Answer)
4.7/5
(36)
An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.
(Multiple Choice)
4.8/5
(31)
List and describe the phases of the traditional systems development life cycle.
(Essay)
4.8/5
(35)
Confidentiality ensures that only those with the rights and privileges to access information are able to do so. _________________________
(True/False)
4.9/5
(31)
Showing 41 - 60 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)