Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.
(Multiple Choice)
4.9/5
(32)
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. _________________________
(True/False)
5.0/5
(45)
According to the CNSS, networking is "the protection of information and its critical elements." _________________________
(True/False)
4.9/5
(34)
MULTICS stands forMultiple Information and Computing Service. _________________________
(True/False)
4.8/5
(31)
A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.
(Short Answer)
4.8/5
(38)
Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. _________________________
(True/False)
4.7/5
(42)
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
(True/False)
4.8/5
(31)
A technique used to compromise a system is known as a(n) ___________.
(Multiple Choice)
4.9/5
(25)
The history of information security begins with the concept of ____________________ security.
(Short Answer)
4.9/5
(33)
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.
(Multiple Choice)
4.9/5
(35)
The protection of all communications media, technology, and content is known as ___________.
(Multiple Choice)
4.8/5
(47)
The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.
(Short Answer)
4.7/5
(31)
In the physical design phase, specific technologies are selected.
(True/False)
4.8/5
(32)
The bottom-up approach to information security has a higher probability of success than the top-down approach.
(True/False)
4.9/5
(36)
____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
(Short Answer)
4.8/5
(40)
__________ of information is the quality or state of being genuine or original.
(Multiple Choice)
4.8/5
(34)
The value of information comes from the characteristics it possesses.
(True/False)
4.9/5
(36)
__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.
(Multiple Choice)
4.8/5
(37)
A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.
(Multiple Choice)
4.8/5
(35)
List and describe the phases of the traditional systems development life cycle.
(Essay)
4.9/5
(38)
Showing 61 - 80 of 87
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)