Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
A(n)project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas._________________________
Free
(True/False)
4.8/5
(44)
Correct Answer:
True
Recently,many states have implemented legislation making certain computer-related activities illegal.
Free
(True/False)
4.9/5
(30)
Correct Answer:
True
The possession of information is the quality or state of having value for some purpose or end.
Free
(True/False)
4.8/5
(44)
Correct Answer:
False
____ was the first operating system to integrate security as its core functions.
(Multiple Choice)
4.7/5
(31)
The ____________________ phase consists primarily of assessments of the organization,its current systems,and its capability to support the proposed systems.
(Essay)
4.8/5
(37)
The ____ is the individual primarily responsible for the assessment,management,and implementation of information security in the organization.
(Multiple Choice)
4.9/5
(41)
A(n)____ attack is a hacker using a personal computer to break into a system.
(Multiple Choice)
4.7/5
(32)
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ____________________.
(Short Answer)
4.8/5
(36)
In the ____________________ approach,the project is initiated by upper-level managers who issue policy,procedures and processes,dictate the goals and expected outcomes,and determine accountability for each required action.
(Short Answer)
4.9/5
(43)
An e-mail virus involves sending an e-mail message with a modified field.
(True/False)
4.9/5
(33)
Confidentiality ensures that only those with the rights and privileges to access information are able to do so._________________________
(True/False)
4.8/5
(36)
The value of information comes from the characteristics it possesses.
(True/False)
4.9/5
(45)
Information has ____________________ when it is whole,complete,and uncorrupted.
(Short Answer)
4.9/5
(34)
A data custodian works directly with data owners and is responsible for the storage,maintenance,and protection of the information.
(True/False)
4.7/5
(44)
A(n)____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.
(Short Answer)
4.8/5
(37)
A frequently overlooked component of an IS,____________________ are written instructions for accomplishing a specific task.
(Short Answer)
4.9/5
(31)
In general,protection is "the quality or state of being secure-to be free from danger." _________________________
(True/False)
4.9/5
(44)
The primary threats to security during the early years of computers were physical theft of equipment,espionage against the products of the systems,and sabotage.
(True/False)
4.7/5
(43)
____________________ of information is the quality or state of being genuine or original,rather than a reproduction or fabrication.
(Essay)
4.9/5
(42)
The most successful kind of top-down approach involves a formal development strategy referred to as a ____.
(Multiple Choice)
4.7/5
(33)
Showing 1 - 20 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)