Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.

(Multiple Choice)
4.7/5
(46)

The senior technology officer is typically the chief ____________________ officer.

(Short Answer)
4.9/5
(43)

A potential weakness in an asset or its defensive control system(s) is known as a(n) ​_________.

(Short Answer)
4.8/5
(42)

The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.

(Multiple Choice)
4.8/5
(36)

During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage.

(True/False)
5.0/5
(37)

The probability of an unwanted occurrence, such as an adverse event or loss, is known as a(n) _________.

(Short Answer)
4.9/5
(31)

Which of the following phases is often considered the longest and most expensive phase of the systems development life cycle?

(Multiple Choice)
4.8/5
(37)

A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.

(True/False)
4.9/5
(46)

Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.

(Short Answer)
4.8/5
(29)

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.

(Essay)
4.9/5
(37)

The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

(Multiple Choice)
4.7/5
(29)

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. _________________________

(True/False)
4.8/5
(37)

Outline types of data ownership and their respective responsibilities.

(Essay)
4.7/5
(40)

During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks, so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.

(Short Answer)
4.8/5
(30)

Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, often referred to as the bottom-up approach. _________________________

(True/False)
4.8/5
(34)

The physical design is the blueprint for the desired solution.

(True/False)
4.8/5
(48)

Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. _________________________

(True/False)
4.8/5
(30)

In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.

(Short Answer)
5.0/5
(38)

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

(Multiple Choice)
4.8/5
(42)

__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.

(Multiple Choice)
5.0/5
(30)
Showing 61 - 80 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)