Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ are the foundation of a security framework.

(Multiple Choice)
4.8/5
(26)

The value of information comes from the characteristics it possesses.

(True/False)
4.9/5
(41)

Which individual is considered to be a script kiddie who uses automated tools to inundate a Web site with a barrage of network traffic, usually resulting in a denial of service?

(Multiple Choice)
4.8/5
(25)

An indirect attack involves a hacker using a personal computer to break into a system.

(True/False)
4.8/5
(40)

How does a man-in-the-middle attack work?

(Essay)
4.9/5
(30)

Describe the chief information security officer (CISO) position.

(Essay)
4.9/5
(32)

Describe how benchmarking and best practices are used and where more information on best practices may be found.

(Essay)
4.9/5
(34)

An unlocked door is an example of a(n) ____.

(Multiple Choice)
4.8/5
(35)

Which threat is the most common intellectual property (IP) breach?

(Multiple Choice)
4.8/5
(35)

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -The quality or state of having value for some purpose or end.

(Short Answer)
4.9/5
(37)

The security blueprint is a detailed version of the security framework.

(True/False)
4.9/5
(30)

In information security, ____ exists when a vulnerability known to an attacker is present.

(Multiple Choice)
4.9/5
(43)

Describe the issue-specific security policy (ISSP) and list three issues it may cover.

(Essay)
4.9/5
(40)

Which term identifies a single instance of an information asset suffering damage, unintended or unauthorized modification, or disclosure?

(Multiple Choice)
4.9/5
(37)

____________________ is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.

(Essay)
4.9/5
(36)

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -A term meaning information is free from mistakes or errors and has the value that the end user expects it to have.

(Short Answer)
4.8/5
(27)

Which resource is a physical asset?

(Multiple Choice)
4.9/5
(35)

Which attack is used when a copy of the hash of the user's password has been obtained?

(Multiple Choice)
4.8/5
(37)

Discuss the layered implementation of security.

(Essay)
4.8/5
(32)

The McCumber Cube provides a ____ description of the architectural approach widely used in computer and information security.

(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)