Exam 6: Information, Communications, and Computer Security
Exam 1: History and Overview37 Questions
Exam 2: Threats to Safety and Security56 Questions
Exam 3: Legal Aspects of Security66 Questions
Exam 4: Physical Security: Structural, Electronic, and Human Protection Systems32 Questions
Exam 5: Personnel Security Through Leadership and Ethics44 Questions
Exam 6: Information, Communications, and Computer Security38 Questions
Exam 7: Risk Assessment, Security Surveys, and Planning34 Questions
Exam 8: Program Implementation and Administration22 Questions
Exam 9: Investigations, Intelligence Operations, and Reporting34 Questions
Exam 10: Institutional Security, Disaster Recovery, and Executive Protection32 Questions
Exam 11: Industrial Security, Retail Loss Prevention, and Workplace Violence38 Questions
Exam 12: Homeland Security: Confronting Terrorism and Domestic Threats37 Questions
Exam 13: Career Opportunities9 Questions
Exam 14: The Future19 Questions
Select questions type
Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
B
________ property is defined as information created through research and development.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
C
________ involves information risk assessment and intelligence activities in a process whereby operations are analyzed to identify vulnerabilities.
Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
A
INFOSEC views operations from an adversary's perspective in an effort to seek out an organization's vulnerabilities and protect its critical information.
(True/False)
5.0/5
(39)
Computer crime is generally defined as any crime committed with computer technology.
(True/False)
4.8/5
(44)
_______ security involves the use of non-exclusive codes and ciphers to transform transmitted data to render it unintelligible.
(Multiple Choice)
4.9/5
(39)
Communications ________ security involves prevention of adverse surveillance by devices such as microphones.
(Multiple Choice)
4.9/5
(40)
According to the United States ________, critical information includes all forms and types of financial, business, scientific, economic, or engineering information.
(Multiple Choice)
4.9/5
(40)
The ________ involves collaboration among several organizations and provides operations security training to agencies and businesses.
(Multiple Choice)
4.9/5
(31)
________ includes all efforts to protect information transmitted by voice, wire, satellite, and other systems from unauthorized interception.
(Multiple Choice)
4.9/5
(36)
________ information policies remind staff of special agreements created to maintain confidentiality and rights to privacy.
(Multiple Choice)
4.8/5
(40)
According to John Carroll's "simple security principle"
for safeguarding sensitive computer information, no person should view information that has a classification that exceeds the viewer's security clearance.
(True/False)
4.8/5
(40)
Unlike business information, all government information must be released upon request.
(True/False)
5.0/5
(32)
According to the protocol for classification of business information, ________ is assigned to the business equivalent of top secret information.
(Multiple Choice)
4.8/5
(39)
According to some experts, theft of money and securities of government represent the greatest threat to governments and businesses today.
(True/False)
4.9/5
(47)
________ pose(s) security risks and challenges for individuals as well as organizations.
(Multiple Choice)
4.9/5
(29)
The ________ is an FBI-maintained computer security resource available to security professionals and computer systems administrators.
(Multiple Choice)
4.7/5
(28)
In the United States government's hierarchical information security structure, the ________ classification is assigned to information which, if disclosed, could be prejudicial to the interests of the United States.
(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 38
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)