Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Outline types of data ownership and their respective responsibilities.

Free
(Essay)
4.9/5
(29)
Correct Answer:
Verified

Working directly with data owners, data custodians are responsible for the storage, maintenance, and protection of the information. The duties of a data custodian often include overseeing data storage and backups, implementing the specific procedures and policies laid out in the security policies and plans, and reporting to the data owner.
Data users: End users who work with the information to perform their daily jobs supporting the mission of the organization. Data users are included as individuals with an information security role.

Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.

Free
(Short Answer)
4.9/5
(39)
Correct Answer:
Verified

project

Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ​_________.

Free
(Short Answer)
4.7/5
(39)
Correct Answer:
Verified

threat​

Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects. _________________________

(True/False)
4.8/5
(26)

A(n) hardwaresystem is the entire set of people, procedures, and technology that enable business to use information. _________________________

(True/False)
4.8/5
(46)

SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functionality and the need for the operations team to improve security and minimize the disruption from software release cycles. _________________________

(True/False)
4.9/5
(32)

Confidentiality ensures that only those with the rights and privileges to access information are able to do so. _________________________

(True/False)
4.9/5
(34)

An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.

(Multiple Choice)
4.9/5
(37)

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________

(True/False)
4.8/5
(35)

A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. _________________________

(True/False)
4.8/5
(44)

____________________ enables authorized users-people or computer systems-to access information without interference or obstruction and to receive it in the required format.

(Short Answer)
4.9/5
(38)

A(n) ____________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.

(Short Answer)
4.9/5
(31)

The senior technology officer is typically the chief ____________________ officer.

(Short Answer)
4.9/5
(38)

Describe the multiple types of security systems present in many organizations.

(Essay)
4.9/5
(39)

Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.

(True/False)
4.7/5
(35)

A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.

(True/False)
4.7/5
(31)

__________ is a network project that preceded the Internet.

(Multiple Choice)
4.9/5
(38)

Which of the following is a valid type of role when it comes to data ownership  

(Multiple Choice)
4.8/5
(33)

The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

(Multiple Choice)
4.8/5
(30)

The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.

(True/False)
4.7/5
(36)
Showing 1 - 20 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)