Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.

(Multiple Choice)
4.9/5
(35)

During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage.

(True/False)
4.9/5
(48)

Key end users should be assigned to a developmental team, known as the united application development team. _________________________

(True/False)
4.8/5
(37)

The ____________________ component of an information system comprises applications, operating systems, and assorted command utilities.

(Short Answer)
4.8/5
(31)

A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.

(Multiple Choice)
4.9/5
(36)

During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.

(Multiple Choice)
4.9/5
(39)

The Analysis phase of the SDLC examines the event or plan that initiates the process and specifies the objectives, constraints, and scope of the project. _________________________

(True/False)
4.9/5
(30)

Of the two approaches to information security implementation, the top-downapproach has a higher probability of success. _________________________

(True/False)
4.8/5
(32)

A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.

(Short Answer)
4.7/5
(34)

The probability of an unwanted occurrence, such as an adverse event or loss, is known as a(n) _________.

(Short Answer)
4.7/5
(47)

The water-ski model is a type of SDLC in which each phase of the process flows from the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.

(True/False)
4.7/5
(39)

An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.

(Multiple Choice)
4.8/5
(34)

A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in project management and information security technical requirements.

(True/False)
4.7/5
(45)

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

(Multiple Choice)
4.8/5
(40)

Organizations are moving toward more __________-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.

(Multiple Choice)
4.7/5
(32)

A type of SDLC in which each phase has results that flow into the next phase is called the  __________ model.

(Multiple Choice)
5.0/5
(30)

A methodology and formal development strategy for the design and implementation of an information system is referred to as a __________.

(Multiple Choice)
4.7/5
(37)

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

(Multiple Choice)
4.8/5
(38)

A potential weakness in an asset or its defensive control system(s) is known as a(n) ​_________.

(Short Answer)
4.8/5
(35)

__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.

(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)