Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The investigation phase of the SDLC involves specification of the objectives, constraints, andscope of the project.

(True/False)
4.8/5
(35)

E-mail spoofing involves sending an e-mail message with a harmful attachment.

(True/False)
4.7/5
(35)

During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks, so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.

(Short Answer)
4.9/5
(42)

In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures, and processes, dictate the goals and expected outcomes, and determine accountability for each required action.

(Short Answer)
4.9/5
(34)

A computer is the ____________________ of an attack when it is the entity being targeted.

(Short Answer)
4.8/5
(37)

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.

(Short Answer)
4.9/5
(41)

When a computer is the subject of an attack, it is the entity being attacked.

(True/False)
4.8/5
(41)

A breach of possession may not always result in a breach of confidentiality.

(True/False)
4.9/5
(35)

In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.

(Short Answer)
4.9/5
(34)

__________ was the first operating system to integrate security as one of its core functions.

(Multiple Choice)
4.9/5
(37)

An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization.

(Multiple Choice)
4.8/5
(38)

The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

(True/False)
4.9/5
(42)

The physical design is the blueprint for the desired solution.

(True/False)
4.8/5
(45)

The possession of information is the quality or state of having value for some purpose or end.

(True/False)
4.9/5
(41)

Information security can be an absolute.

(True/False)
4.9/5
(42)

Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, often referred to as the bottom-up approach. _________________________

(True/False)
4.8/5
(38)

Which of the following phases is often considered the longest and most expensive phase of the systems development life cycle  

(Multiple Choice)
4.8/5
(33)

The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.

(Short Answer)
4.9/5
(40)

When unauthorized individuals or systems can view information, confidentiality is breached. _________________________

(True/False)
4.7/5
(32)

During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.

(Short Answer)
4.8/5
(38)
Showing 41 - 60 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)