Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. -Component in a system that allows the attacker to access the system at will, bypassing standard login controls.

(Multiple Choice)
4.7/5
(35)

When a computer is the ____ of an attack, it is used as an active tool to conduct the attack.

(Multiple Choice)
4.8/5
(27)

To make sound decisions about information security, management must be informed about the various threats facing the organization, its people, applications, data, and information systems.

(True/False)
4.9/5
(33)

Match each item with a statement below. -Involves operating an information system that meets the high level of availability sought by system users as well as the confidentiality and integrity needs of system owners and security professionals

(Multiple Choice)
4.8/5
(28)

A(n) ____ is a weakness or fault in the mechanisms that are intended to protect information and information assets from attack or damage.

(Multiple Choice)
4.9/5
(29)

The ____________________ is primarily responsible for advising the chief executive officer, president, or company owner on the strategic planning that affects the management of information in the organization.

(Short Answer)
4.9/5
(34)

Describe characteristic of utility as it relates to information.

(Essay)
4.8/5
(29)

What is the role of the chief information security officer (CISO)?

(Essay)
4.8/5
(35)

A data ____ might be a specifically identified role or part of the duties of a systems administrator.

(Multiple Choice)
4.9/5
(36)

____ attacks may involve individuals posing as new employees or as current employees desperately requesting assistance to avoid getting fired.

(Multiple Choice)
4.9/5
(38)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)