Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One of the basic tenets of security architectures is the spheres of security.

(True/False)
4.9/5
(28)

A(n) ____________________ defines the boundary between the outer limit of an organization's security and the beginning of the outside world.

(Short Answer)
4.8/5
(40)

A(n) ____________________ is a program or device that monitors data traveling over a network.

(Short Answer)
4.9/5
(46)

Which security project team role is filled by individuals who understand the organizational culture, existing policies, and requirements for developing and implementing successful policies?

(Multiple Choice)
4.8/5
(37)

Define configuration rule policies and compare them to access control lists(ACLs).

(Essay)
4.8/5
(37)

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -People who work directly with data owners and are responsible for the storage, maintenance, and protection of the information.

(Short Answer)
4.8/5
(38)

Which security project team role is filled by a senior executive who promotes the project and ensures that it is supported, both financially and administratively, at the highest levels of the organization?

(Multiple Choice)
4.8/5
(35)

A(n) ____ is a written statement of the organization's purpose.

(Multiple Choice)
4.8/5
(41)

Which e-mail attack occurs when an attacker routes large quantities of e-mail to the target system?

(Multiple Choice)
4.8/5
(41)

There are two general methods for implementing technical controls within a specific application to enforce policy: ____ and configuration rules.

(Multiple Choice)
4.7/5
(27)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)