Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
A breach of possession always results in a breach of confidentiality.
(True/False)
4.7/5
(37)
The ____ is a methodology for the design and implementation of an information system in an organization.
(Multiple Choice)
4.7/5
(34)
Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat._________________________
(True/False)
4.9/5
(35)
Describe the multiple types of security systems present in many organizations.
(Essay)
4.8/5
(32)
Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
(True/False)
4.7/5
(40)
MULTICS stands for Multiple Information and Computing Service._________________________
(True/False)
4.7/5
(38)
A(n)_________________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.
(Essay)
4.9/5
(36)
In file hashing,a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.
(Multiple Choice)
4.9/5
(31)
In information security,salami theft occurs when an employee steals a few pieces of information at a time,knowing that taking more would be noticed - but eventually the employee gets something complete or useable._________________________
(True/False)
4.8/5
(41)
____ of information is the quality or state of being genuine or original.
(Multiple Choice)
5.0/5
(36)
Risk evaluation is the process of identifying,assessing,and evaluating the levels of risk facing the organization,specifically the threats to the organization's security and to the information stored and processed by the organization._________________________
(True/False)
4.7/5
(34)
A famous study entitled "Protection Analysis: Final Report" was published in ____.
(Multiple Choice)
4.8/5
(42)
A computer is the ____________________ of an attack when it is the target entity.
(Short Answer)
4.8/5
(38)
____ security addresses the issues necessary to protect the tangible items,objects,or areas of an organization from unauthorized access and misuse.
(Multiple Choice)
4.8/5
(30)
To achieve balance - that is,to operate an information system that satisfies the user and the security professional - the security level must allow reasonable access,yet protect against threats.
(True/False)
4.8/5
(33)
Organizations are moving toward more ____-focused development approaches,seeking to improve not only the functionality of the systems they have in place,but consumer confidence in their product.
(Multiple Choice)
4.9/5
(41)
The roles of information security professionals are aligned with the goals and mission of the information security community of interest.
(True/False)
4.8/5
(37)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)