Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The investigation phase of the SDLC involves specification of the objectives, constraints, andscope of the project.
(True/False)
4.8/5
(35)
E-mail spoofing involves sending an e-mail message with a harmful attachment.
(True/False)
4.7/5
(35)
During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks, so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
(Short Answer)
4.9/5
(42)
In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures, and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
(Short Answer)
4.9/5
(34)
A computer is the ____________________ of an attack when it is the entity being targeted.
(Short Answer)
4.8/5
(37)
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.
(Short Answer)
4.9/5
(41)
When a computer is the subject of an attack, it is the entity being attacked.
(True/False)
4.8/5
(41)
A breach of possession may not always result in a breach of confidentiality.
(True/False)
4.9/5
(35)
In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.
(Short Answer)
4.9/5
(34)
__________ was the first operating system to integrate security as one of its core functions.
(Multiple Choice)
4.9/5
(37)
An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization.
(Multiple Choice)
4.8/5
(38)
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
(True/False)
4.9/5
(42)
The possession of information is the quality or state of having value for some purpose or end.
(True/False)
4.9/5
(41)
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, often referred to as the bottom-up approach. _________________________
(True/False)
4.8/5
(38)
Which of the following phases is often considered the longest and most expensive phase of the systems development life cycle
(Multiple Choice)
4.8/5
(33)
The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
(Short Answer)
4.9/5
(40)
When unauthorized individuals or systems can view information, confidentiality is breached. _________________________
(True/False)
4.7/5
(32)
During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
(Short Answer)
4.8/5
(38)
Showing 41 - 60 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)