Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas._________________________

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

True

Recently,many states have implemented legislation making certain computer-related activities illegal.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

True

The possession of information is the quality or state of having value for some purpose or end.

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

False

____ was the first operating system to integrate security as its core functions.

(Multiple Choice)
4.7/5
(31)

The ____________________ phase consists primarily of assessments of the organization,its current systems,and its capability to support the proposed systems.

(Essay)
4.8/5
(37)

The ____ is the individual primarily responsible for the assessment,management,and implementation of information security in the organization.

(Multiple Choice)
4.9/5
(41)

A(n)____ attack is a hacker using a personal computer to break into a system.

(Multiple Choice)
4.7/5
(32)

The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ____________________.

(Short Answer)
4.8/5
(36)

In the ____________________ approach,the project is initiated by upper-level managers who issue policy,procedures and processes,dictate the goals and expected outcomes,and determine accountability for each required action.

(Short Answer)
4.9/5
(43)

An e-mail virus involves sending an e-mail message with a modified field.

(True/False)
4.9/5
(33)

Confidentiality ensures that only those with the rights and privileges to access information are able to do so._________________________

(True/False)
4.8/5
(36)

The value of information comes from the characteristics it possesses.

(True/False)
4.9/5
(45)

Information has ____________________ when it is whole,complete,and uncorrupted.

(Short Answer)
4.9/5
(34)

A data custodian works directly with data owners and is responsible for the storage,maintenance,and protection of the information.

(True/False)
4.7/5
(44)

A(n)____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.

(Short Answer)
4.8/5
(37)

A frequently overlooked component of an IS,____________________ are written instructions for accomplishing a specific task.

(Short Answer)
4.9/5
(31)

In general,protection is "the quality or state of being secure-to be free from danger." _________________________

(True/False)
4.9/5
(44)

The primary threats to security during the early years of computers were physical theft of equipment,espionage against the products of the systems,and sabotage.

(True/False)
4.7/5
(43)

____________________ of information is the quality or state of being genuine or original,rather than a reproduction or fabrication.

(Essay)
4.9/5
(42)

The most successful kind of top-down approach involves a formal development strategy referred to as a ____.

(Multiple Choice)
4.7/5
(33)
Showing 1 - 20 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)