Exam 6: Information, Communications, and Computer Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

B

________ property is defined as information created through research and development.

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

C

________ involves information risk assessment and intelligence activities in a process whereby operations are analyzed to identify vulnerabilities.

Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
Verified

A

INFOSEC views operations from an adversary's perspective in an effort to seek out an organization's vulnerabilities and protect its critical information.

(True/False)
5.0/5
(39)

Computer crime is generally defined as any crime committed with computer technology.

(True/False)
4.8/5
(44)

_______ security involves the use of non-exclusive codes and ciphers to transform transmitted data to render it unintelligible.

(Multiple Choice)
4.9/5
(39)

Communications ________ security involves prevention of adverse surveillance by devices such as microphones.

(Multiple Choice)
4.9/5
(40)

According to the United States ________, critical information includes all forms and types of financial, business, scientific, economic, or engineering information.

(Multiple Choice)
4.9/5
(40)

The ________ involves collaboration among several organizations and provides operations security training to agencies and businesses.

(Multiple Choice)
4.9/5
(31)

What is the purpose of information security (INFOSEC)?

(Essay)
4.9/5
(39)

________ includes all efforts to protect information transmitted by voice, wire, satellite, and other systems from unauthorized interception.

(Multiple Choice)
4.9/5
(36)

________ information policies remind staff of special agreements created to maintain confidentiality and rights to privacy.

(Multiple Choice)
4.8/5
(40)

According to John Carroll's "simple security principle" for safeguarding sensitive computer information, no person should view information that has a classification that exceeds the viewer's security clearance.

(True/False)
4.8/5
(40)

Unlike business information, all government information must be released upon request.

(True/False)
5.0/5
(32)

According to the protocol for classification of business information, ________ is assigned to the business equivalent of top secret information.

(Multiple Choice)
4.8/5
(39)

According to some experts, theft of money and securities of government represent the greatest threat to governments and businesses today.

(True/False)
4.9/5
(47)

________ pose(s) security risks and challenges for individuals as well as organizations.

(Multiple Choice)
4.9/5
(29)

The ________ is an FBI-maintained computer security resource available to security professionals and computer systems administrators.

(Multiple Choice)
4.7/5
(28)

In the United States government's hierarchical information security structure, the ________ classification is assigned to information which, if disclosed, could be prejudicial to the interests of the United States.

(Multiple Choice)
4.9/5
(31)

Phishing is not a form of identity theft.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 38
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)