Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

During the early years,information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.

(Short Answer)
4.9/5
(31)

Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects._________________________

(True/False)
4.8/5
(34)

Of the two approaches to information security implementation,the top-down approach has a higher probability of success._________________________

(True/False)
4.8/5
(36)

An information system is the entire set of ____,people,procedures,and networks that make possible the use of information resources in the organization.

(Multiple Choice)
4.7/5
(27)

____________________ carries the lifeblood of information through an organization.

(Short Answer)
4.9/5
(41)

The history of information security begins with the history of ____________________ security.

(Essay)
4.9/5
(36)

The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

(True/False)
4.8/5
(32)

Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.

(True/False)
4.9/5
(45)

Using a methodology increases the probability of success.

(True/False)
4.8/5
(34)

In an organization,the value of ____________________ of information is especially high when it involves personal information about employees,customers,or patients.

(Essay)
4.8/5
(41)

During the ____________________ War,many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.

(Essay)
4.9/5
(33)

Network security focuses on the protection of the details of a particular operation or series of activities.

(True/False)
4.9/5
(47)

List and describe the six phases of the security systems development life cycle.

(Essay)
4.8/5
(44)

Outline types of data ownership and their respective responsibilities.

(Essay)
4.7/5
(42)

Which of the following phases is the longest and most expensive phase of the systems development life cycle?

(Multiple Choice)
4.9/5
(34)

Hardware is the physical technology that houses and executes the software,stores and transports the data,and provides interfaces for the entry and removal of information from the system._________________________

(True/False)
4.8/5
(31)

A computer is the ____ of an attack when it is used to conduct the attack.

(Multiple Choice)
4.8/5
(35)

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triangle.

(Essay)
4.8/5
(33)
Showing 61 - 78 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)