Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Outline types of data ownership and their respective responsibilities.
Free
(Essay)
4.9/5
(29)
Correct Answer:
Working directly with data owners, data custodians are responsible for the storage, maintenance, and protection of the information. The duties of a data custodian often include overseeing data storage and backups, implementing the specific procedures and policies laid out in the security policies and plans, and reporting to the data owner.
Data users: End users who work with the information to perform their daily jobs supporting the mission of the organization. Data users are included as individuals with an information security role.
Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.
Free
(Short Answer)
4.9/5
(39)
Correct Answer:
project
Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) _________.
Free
(Short Answer)
4.7/5
(39)
Correct Answer:
threat
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects. _________________________
(True/False)
4.8/5
(26)
A(n) hardwaresystem is the entire set of people, procedures, and technology that enable business to use information. _________________________
(True/False)
4.8/5
(46)
SecOps focuses on integrating the need for the development team to provide iterative and
rapid improvements to system functionality and the need for the operations team to improve
security and minimize the disruption from software release cycles. _________________________
(True/False)
4.9/5
(32)
Confidentiality ensures that only those with the rights and privileges to access information are able to do so. _________________________
(True/False)
4.9/5
(34)
An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.
(Multiple Choice)
4.9/5
(37)
Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________
(True/False)
4.8/5
(35)
A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. _________________________
(True/False)
4.8/5
(44)
____________________ enables authorized users-people or computer systems-to access information without interference or obstruction and to receive it in the required format.
(Short Answer)
4.9/5
(38)
A(n) ____________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.
(Short Answer)
4.9/5
(31)
The senior technology officer is typically the chief ____________________ officer.
(Short Answer)
4.9/5
(38)
Describe the multiple types of security systems present in many organizations.
(Essay)
4.9/5
(39)
Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
(True/False)
4.7/5
(35)
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
(True/False)
4.7/5
(31)
__________ is a network project that preceded the Internet.
(Multiple Choice)
4.9/5
(38)
Which of the following is a valid type of role when it comes to data ownership
(Multiple Choice)
4.8/5
(33)
The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.
(Multiple Choice)
4.8/5
(30)
The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.
(True/False)
4.7/5
(36)
Showing 1 - 20 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)