Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.
(Multiple Choice)
4.7/5
(46)
The senior technology officer is typically the chief ____________________ officer.
(Short Answer)
4.9/5
(43)
A potential weakness in an asset or its defensive control system(s) is known as a(n) _________.
(Short Answer)
4.8/5
(42)
The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.
(Multiple Choice)
4.8/5
(36)
During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage.
(True/False)
5.0/5
(37)
The probability of an unwanted occurrence, such as an adverse event or loss, is known as a(n) _________.
(Short Answer)
4.9/5
(31)
Which of the following phases is often considered the longest and most expensive phase of the systems development life cycle?
(Multiple Choice)
4.8/5
(37)
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
(True/False)
4.9/5
(46)
Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.
(Short Answer)
4.8/5
(29)
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.
(Essay)
4.9/5
(37)
The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.
(Multiple Choice)
4.7/5
(29)
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. _________________________
(True/False)
4.8/5
(37)
Outline types of data ownership and their respective responsibilities.
(Essay)
4.7/5
(40)
During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks, so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
(Short Answer)
4.8/5
(30)
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, often referred to as the bottom-up approach. _________________________
(True/False)
4.8/5
(34)
Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. _________________________
(True/False)
4.8/5
(30)
In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.
(Short Answer)
5.0/5
(38)
A computer is the __________ of an attack when it is used to conduct an attack against another computer.
(Multiple Choice)
4.8/5
(42)
__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
(Multiple Choice)
5.0/5
(30)
Showing 61 - 80 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)