Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
The ____________________ component of the IS comprises applications,operating systems,and assorted command utilities.
(Short Answer)
4.9/5
(46)
During the ____ phase,specific technologies are selected to support the alternatives identified and evaluated in the logical design.
(Multiple Choice)
4.9/5
(35)
____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.
(Multiple Choice)
4.8/5
(38)
The Analysis phase of the SecSDLC begins with a directive from upper management._________________________
(True/False)
4.8/5
(41)
Policies are written instructions for accomplishing a specific task._________________________
(True/False)
5.0/5
(34)
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems,which is often referred to as a bottom-up approach._________________________
(True/False)
4.9/5
(39)
Key end users should be assigned to a developmental team,known as the united application development team._________________________
(True/False)
4.9/5
(39)
A champion is a project manager,who may be a departmental line manager or staff unit manager,and understands project management,personnel management,and information security technical requirements.
(True/False)
4.8/5
(35)
The bottom-up approach to information security has a higher probability of success than the top-down approach.
(True/False)
4.9/5
(36)
____________________ enables authorized users - persons or computer systems - to access information without interference or obstruction and to receive it in the required format.
(Essay)
4.9/5
(41)
A(n)____________________ information security policy outlines the implementation of a security program within the organization.
(Short Answer)
4.7/5
(36)
When a computer is the subject of an attack,it is the entity being attacked.
(True/False)
4.8/5
(45)
The senior technology officer is typically the chief ____________________ officer.
(Short Answer)
4.9/5
(43)
The investigation phase of the SecSDLC begins with a directive from upper management.
(True/False)
4.8/5
(38)
People with the primary responsibility for administering the systems that house the information used by the organization perform the ____ role.
(Multiple Choice)
4.9/5
(32)
The Security Development Life Cycle (SDLC)is a methodology for the design and implementation of an information system._________________________
(True/False)
4.8/5
(39)
Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss.____ dictates what steps are taken when an attack occurs.
(Multiple Choice)
4.7/5
(34)
The ____________________ of information is the quality or state of ownership or control of some object or item.
(Short Answer)
4.7/5
(26)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)