Exam 1: Introduction to Information Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
During the early years,information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
(Short Answer)
4.9/5
(31)
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects._________________________
(True/False)
4.8/5
(34)
Of the two approaches to information security implementation,the top-down approach has a higher probability of success._________________________
(True/False)
4.8/5
(36)
An information system is the entire set of ____,people,procedures,and networks that make possible the use of information resources in the organization.
(Multiple Choice)
4.7/5
(27)
____________________ carries the lifeblood of information through an organization.
(Short Answer)
4.9/5
(41)
The history of information security begins with the history of ____________________ security.
(Essay)
4.9/5
(36)
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
(True/False)
4.8/5
(32)
Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.
(True/False)
4.9/5
(45)
In an organization,the value of ____________________ of information is especially high when it involves personal information about employees,customers,or patients.
(Essay)
4.8/5
(41)
During the ____________________ War,many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
(Essay)
4.9/5
(33)
Network security focuses on the protection of the details of a particular operation or series of activities.
(True/False)
4.9/5
(47)
List and describe the six phases of the security systems development life cycle.
(Essay)
4.8/5
(44)
Outline types of data ownership and their respective responsibilities.
(Essay)
4.7/5
(42)
Which of the following phases is the longest and most expensive phase of the systems development life cycle?
(Multiple Choice)
4.9/5
(34)
Hardware is the physical technology that houses and executes the software,stores and transports the data,and provides interfaces for the entry and removal of information from the system._________________________
(True/False)
4.8/5
(31)
A computer is the ____ of an attack when it is used to conduct the attack.
(Multiple Choice)
4.8/5
(35)
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triangle.
(Essay)
4.8/5
(33)
Showing 61 - 78 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)