Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____________________ component of the IS comprises applications,operating systems,and assorted command utilities.

(Short Answer)
4.9/5
(46)

During the ____ phase,specific technologies are selected to support the alternatives identified and evaluated in the logical design.

(Multiple Choice)
4.9/5
(35)

____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.

(Multiple Choice)
4.8/5
(38)

The Analysis phase of the SecSDLC begins with a directive from upper management._________________________

(True/False)
4.8/5
(41)

Policies are written instructions for accomplishing a specific task._________________________

(True/False)
5.0/5
(34)

Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems,which is often referred to as a bottom-up approach._________________________

(True/False)
4.9/5
(39)

Key end users should be assigned to a developmental team,known as the united application development team._________________________

(True/False)
4.9/5
(39)

A champion is a project manager,who may be a departmental line manager or staff unit manager,and understands project management,personnel management,and information security technical requirements.

(True/False)
4.8/5
(35)

The bottom-up approach to information security has a higher probability of success than the top-down approach.

(True/False)
4.9/5
(36)

____________________ enables authorized users - persons or computer systems - to access information without interference or obstruction and to receive it in the required format.

(Essay)
4.9/5
(41)

A(n)____________________ information security policy outlines the implementation of a security program within the organization.

(Short Answer)
4.7/5
(36)

Which of the following is a valid type of data ownership?

(Multiple Choice)
4.9/5
(36)

When a computer is the subject of an attack,it is the entity being attacked.

(True/False)
4.8/5
(45)

The senior technology officer is typically the chief ____________________ officer.

(Short Answer)
4.9/5
(43)

The investigation phase of the SecSDLC begins with a directive from upper management.

(True/False)
4.8/5
(38)

People with the primary responsibility for administering the systems that house the information used by the organization perform the ____ role.

(Multiple Choice)
4.9/5
(32)

The Security Development Life Cycle (SDLC)is a methodology for the design and implementation of an information system._________________________

(True/False)
4.8/5
(39)

The physical design is the blueprint for the desired solution.

(True/False)
5.0/5
(36)

Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss.____ dictates what steps are taken when an attack occurs.

(Multiple Choice)
4.7/5
(34)

The ____________________ of information is the quality or state of ownership or control of some object or item.

(Short Answer)
4.7/5
(26)
Showing 41 - 60 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)