Exam 6: Information, Communications, and Computer Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Mandatory access control strategies trace their origins to restrictive legislation.

(True/False)
4.8/5
(36)

Acoustical emanations are produced through the interplay of electrical and mechanical parts contained in communications equipment.

(True/False)
4.8/5
(34)

Information's worth can only be determined by calculating the political and financial impact of its loss.

(True/False)
4.8/5
(42)

________ should be utilized to secure computer systems and data.

(Multiple Choice)
4.9/5
(38)

Define and contrast critical information, proprietary information, and intellectual property.

(Essay)
4.8/5
(39)

Converting plain text to crypto text is referred to as decryption.

(True/False)
4.9/5
(33)

Threats to critical information include:

(Multiple Choice)
4.8/5
(37)

Interception of emanations can be prevented if computer rooms are constructed with acoustical materials and non-radiating electronic equipment is used.

(True/False)
4.7/5
(35)

Security for computer systems must include strategies to protect:

(Multiple Choice)
4.8/5
(45)

Cryptographic security should not be viewed as a substitute for physical, personnel, and information security.

(True/False)
4.8/5
(25)

At the United States government level, enforcement of laws relative to the theft of trade secrets or harassment on the Internet falls under the jurisdiction of the:

(Multiple Choice)
4.9/5
(45)

The ________ regulates private industry's access to classified government information.

(Multiple Choice)
4.7/5
(36)

________ agreements are used to prevent release of information by those who inadvertently come into contact with classified or critical data.

(Multiple Choice)
4.8/5
(37)

The purpose of ________ is to protect information assets and systems against any internal or external threat that might endanger them.

(Multiple Choice)
4.8/5
(47)

Anti-virus software is used to screen electronic traffic before allowing access to computer networks.

(True/False)
4.8/5
(29)

________ property is defined as virtually any information belonging to an individual or organization.

(Multiple Choice)
4.9/5
(34)

Digitized information is not distance- or time-dependent.

(True/False)
4.8/5
(37)

With discretionary information access control, access is allowed on a need-to-know basis.

(True/False)
4.8/5
(38)
Showing 21 - 38 of 38
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)