Exam 1: Introduction to the Management of Information Security
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program55 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls?
(Multiple Choice)
4.9/5
(30)
A(n)polymorphic threat is one that over time changes the way it appears to antivirus software programs,making it undetectable by techniques that look for pre-configured signatures._________________________
(True/False)
4.9/5
(33)
Duplication of software-based intellectual property is more commonly known as software ____________________.
(Short Answer)
4.9/5
(36)
Which of the following is the first step in the problem-solving process?
(Multiple Choice)
4.8/5
(39)
A device (or a software program on a computer)that can monitor data traveling on a network is known as a socket sniffer._________________________
(True/False)
4.9/5
(36)
Attempting to reverse-calculate a password is called ____________________.
(Short Answer)
4.8/5
(33)
A virus or worm can have a payload that installs a(n)____________________ door or trap door component in a system,which allows the attacker to access the system at will with special privileges.
(Short Answer)
4.9/5
(36)
A(n)____________________ is an act against an asset that could result in a loss.
(Short Answer)
4.9/5
(34)
A short-term interruption in electrical power availability is known as a ____.
(Multiple Choice)
4.9/5
(42)
Which of the following is NOT a primary function of Information Security Management?
(Multiple Choice)
4.7/5
(29)
The macro virus infects the key operating system files located in a computer's start up sector._________________________
(True/False)
4.8/5
(33)
Blackmail threat of informational disclosure is an example of which threat category?
(Multiple Choice)
4.7/5
(38)
A(n)____________________ is a potential weakness in an asset or its defensive control(s).
(Short Answer)
4.8/5
(38)
Which of the following is a C.I.A.characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information?
(Multiple Choice)
4.8/5
(32)
As frustrating as viruses and worms are,perhaps more time and money is spent on resolving virus ____________________.
(Multiple Choice)
4.8/5
(41)
What are the three distinct groups of decision makers or communities of interest on an information security team?
(Essay)
4.9/5
(44)
Some information gathering techniques are quite legal,for example,using a Web browser to perform market research.These legal techniques are called,collectively,competitive ____________________.
(Short Answer)
4.8/5
(35)
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach,so that users who subsequently visit those sites become infected.
(True/False)
4.8/5
(32)
Showing 21 - 40 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)