Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

__________ is a network project that preceded the Internet.

(Multiple Choice)
4.8/5
(44)

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

(Multiple Choice)
4.9/5
(33)

A technique used to compromise a system is known as a(n) ___________.

(Multiple Choice)
4.8/5
(39)

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.

(Multiple Choice)
4.8/5
(43)

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________

(True/False)
4.8/5
(38)

The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.

(Multiple Choice)
4.7/5
(36)

​The protection of all communications media, technology, and content is known as ___________.

(Multiple Choice)
4.8/5
(37)
Showing 81 - 87 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)