Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Using a methodology will usually have no effect on the probability of success.

(True/False)
4.8/5
(33)

Information has ____________________ when it is whole, complete, and uncorrupted.

(Short Answer)
4.8/5
(40)

During the  ____________________ phase of the systems life cycle, the process begins by examining theevent or plan that initiated the process. During this phase, the objectives, constraints, and scope of the project are specified.

(Short Answer)
4.8/5
(34)

In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.

(Multiple Choice)
4.8/5
(50)

The ____________________ of information is the quality or state of ownership or control of some object or item.

(Short Answer)
4.9/5
(37)

To achieve balance-that is, to operate an information system that satisfies the user and the security professional-the security level must allow reasonable access, yet protect against threats.

(True/False)
4.8/5
(35)

People with the primary responsibility for administering the systems that house the information used by the organization perform the role of ____.

(Multiple Choice)
4.8/5
(41)
Showing 81 - 87 of 87
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)