Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ would typically NOT be a member of the security project team.

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

D

____ refers to multiple layers of security controls and safeguards is called.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

C

Acceptance is a viable solution only if the organization has evaluated the risk and determined that the implementation of additional controls or strategies is not justified, due to cost or other organizational issues.

Free
(True/False)
4.8/5
(45)
Correct Answer:
Verified

True

____ means that information is free from mistakes or errors.

(Multiple Choice)
4.9/5
(34)

A(n) ____ attack is when a system is compromised and used to attack other systems.

(Multiple Choice)
4.9/5
(37)

An organization will often create a network security ____________________, which defines the boundary between the outer limit of an organization's security and the beginning of the outside network.

(Short Answer)
4.8/5
(32)

A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database applications is called a ____.

(Multiple Choice)
4.9/5
(40)

A(n) ____ is a category of object, person, or other entity that poses a potential risk of loss to an asset.

(Multiple Choice)
4.9/5
(27)

End users are ____.

(Multiple Choice)
4.7/5
(35)

A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the target with so much irrelevant email that legitimate email cannot be used.

(Multiple Choice)
4.7/5
(49)

Brute force attacks are often successful against systems that have adopted the usual security practices recommended by manufacturers.

(True/False)
4.7/5
(35)

Attempting to determine a password that is not known to the attacker is often called ____.

(Multiple Choice)
4.8/5
(27)

A ____ attempts to protect internal systems from outside threats.

(Multiple Choice)
4.9/5
(34)

Match each item with a statement below. -Responsible for the storage, maintenance, and protection of the information.

(Multiple Choice)
4.8/5
(38)

The ____ is based on a model developed by the U.S.Committee on National Systems Security (CNSS).

(Multiple Choice)
4.8/5
(32)

Describe the importance of enabling the safe operation of applications.

(Essay)
4.9/5
(31)

In a ____ attack, the attacker sends a large number of connection or information requests to a target in an attempt to overwhelm its capacity and make it unavailable for legitimate users.

(Multiple Choice)
4.8/5
(34)

The most common Intellectual Property breach is ____________________.

(Short Answer)
4.7/5
(35)

Match each item with a statement below. -Information is protected from disclosure or exposure to unauthorized individuals or systems.

(Multiple Choice)
5.0/5
(35)

Match each item with a statement below. -Information remains whole, complete, and uncorrupted.

(Multiple Choice)
4.7/5
(28)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)