Exam 6: Information, Communications, and Computer Security
Exam 1: History and Overview37 Questions
Exam 2: Threats to Safety and Security56 Questions
Exam 3: Legal Aspects of Security66 Questions
Exam 4: Physical Security: Structural, Electronic, and Human Protection Systems32 Questions
Exam 5: Personnel Security Through Leadership and Ethics44 Questions
Exam 6: Information, Communications, and Computer Security38 Questions
Exam 7: Risk Assessment, Security Surveys, and Planning34 Questions
Exam 8: Program Implementation and Administration22 Questions
Exam 9: Investigations, Intelligence Operations, and Reporting34 Questions
Exam 10: Institutional Security, Disaster Recovery, and Executive Protection32 Questions
Exam 11: Industrial Security, Retail Loss Prevention, and Workplace Violence38 Questions
Exam 12: Homeland Security: Confronting Terrorism and Domestic Threats37 Questions
Exam 13: Career Opportunities9 Questions
Exam 14: The Future19 Questions
Select questions type
Mandatory access control strategies trace their origins to restrictive legislation.
(True/False)
4.8/5
(36)
Acoustical emanations are produced through the interplay of electrical and mechanical parts contained in communications equipment.
(True/False)
4.8/5
(34)
Information's worth can only be determined by calculating the political and financial impact of its loss.
(True/False)
4.8/5
(42)
________ should be utilized to secure computer systems and data.
(Multiple Choice)
4.9/5
(38)
Define and contrast critical information, proprietary information, and intellectual property.
(Essay)
4.8/5
(39)
Converting plain text to crypto text is referred to as decryption.
(True/False)
4.9/5
(33)
Interception of emanations can be prevented if computer rooms are constructed with acoustical materials and non-radiating electronic equipment is used.
(True/False)
4.7/5
(35)
Security for computer systems must include strategies to protect:
(Multiple Choice)
4.8/5
(45)
Cryptographic security should not be viewed as a substitute for physical, personnel, and information security.
(True/False)
4.8/5
(25)
At the United States government level, enforcement of laws relative to the theft of trade secrets or harassment on the Internet falls under the jurisdiction of the:
(Multiple Choice)
4.9/5
(45)
The ________ regulates private industry's access to classified government information.
(Multiple Choice)
4.7/5
(36)
________ agreements are used to prevent release of information by those who inadvertently come into contact with classified or critical data.
(Multiple Choice)
4.8/5
(37)
The purpose of ________ is to protect information assets and systems against any internal or external threat that might endanger them.
(Multiple Choice)
4.8/5
(47)
Anti-virus software is used to screen electronic traffic before allowing access to computer networks.
(True/False)
4.8/5
(29)
________ property is defined as virtually any information belonging to an individual or organization.
(Multiple Choice)
4.9/5
(34)
With discretionary information access control, access is allowed on a need-to-know basis.
(True/False)
4.8/5
(38)
Showing 21 - 38 of 38
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)