Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A breach of possession always results in a breach of confidentiality.

(True/False)
4.7/5
(37)

The ____ is a methodology for the design and implementation of an information system in an organization.

(Multiple Choice)
4.7/5
(34)

Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat._________________________

(True/False)
4.9/5
(35)

Describe the multiple types of security systems present in many organizations.

(Essay)
4.8/5
(32)

Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.

(True/False)
4.7/5
(40)

MULTICS stands for Multiple Information and Computing Service._________________________

(True/False)
4.7/5
(38)

A(n)_________________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.

(Essay)
4.9/5
(36)

____ is the predecessor to the Internet.

(Multiple Choice)
4.9/5
(34)

In file hashing,a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.

(Multiple Choice)
4.9/5
(31)

In information security,salami theft occurs when an employee steals a few pieces of information at a time,knowing that taking more would be noticed - but eventually the employee gets something complete or useable._________________________

(True/False)
4.8/5
(41)

____ of information is the quality or state of being genuine or original.

(Multiple Choice)
5.0/5
(36)

Risk evaluation is the process of identifying,assessing,and evaluating the levels of risk facing the organization,specifically the threats to the organization's security and to the information stored and processed by the organization._________________________

(True/False)
4.7/5
(34)

A famous study entitled "Protection Analysis: Final Report" was published in ____.

(Multiple Choice)
4.8/5
(42)

A computer is the ____________________ of an attack when it is the target entity.

(Short Answer)
4.8/5
(38)

____ security addresses the issues necessary to protect the tangible items,objects,or areas of an organization from unauthorized access and misuse.

(Multiple Choice)
4.8/5
(30)

To achieve balance - that is,to operate an information system that satisfies the user and the security professional - the security level must allow reasonable access,yet protect against threats.

(True/False)
4.8/5
(33)

Information security can be an absolute.

(True/False)
4.8/5
(41)

Organizations are moving toward more ____-focused development approaches,seeking to improve not only the functionality of the systems they have in place,but consumer confidence in their product.

(Multiple Choice)
4.9/5
(41)

The roles of information security professionals are aligned with the goals and mission of the information security community of interest.

(True/False)
4.8/5
(37)

The ____ model consists of six general phases.

(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)