Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.

(Multiple Choice)
4.9/5
(32)

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. _________________________

(True/False)
5.0/5
(45)

According to the CNSS, networking is "the protection of information and its critical elements." _________________________

(True/False)
4.9/5
(34)

MULTICS stands forMultiple Information and Computing Service. _________________________

(True/False)
4.8/5
(31)

A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.

(Short Answer)
4.8/5
(38)

Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. _________________________

(True/False)
4.7/5
(42)

Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.

(True/False)
4.8/5
(31)

A technique used to compromise a system is known as a(n) ___________.

(Multiple Choice)
4.9/5
(25)

The history of information security begins with the concept of ____________________ security.

(Short Answer)
4.9/5
(33)

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.

(Multiple Choice)
4.9/5
(35)

​The protection of all communications media, technology, and content is known as ___________.

(Multiple Choice)
4.8/5
(47)

The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.

(Short Answer)
4.7/5
(31)

In the physical design phase, specific technologies are selected.

(True/False)
4.8/5
(32)

The bottom-up approach to information security has a higher probability of success than the top-down approach.

(True/False)
4.9/5
(36)

____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.

(Short Answer)
4.8/5
(40)

__________ of information is the quality or state of being genuine or original.

(Multiple Choice)
4.8/5
(34)

The value of information comes from the characteristics it possesses.

(True/False)
4.9/5
(36)

__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.

(Multiple Choice)
4.8/5
(37)

A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.

(Multiple Choice)
4.8/5
(35)

List and describe the phases of the traditional systems development life cycle.

(Essay)
4.9/5
(38)
Showing 61 - 80 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)