Exam 1: Introduction to the Management of Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program?

(Multiple Choice)
4.9/5
(31)

"4-1-9" fraud is an example of a____________________attack.

(Multiple Choice)
4.9/5
(39)

Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n)____.

(Multiple Choice)
4.8/5
(31)

The application of computing and network resources to try every possible combination of options of a password is called adictionary attack._________________________

(True/False)
4.8/5
(49)

Which of the following is NOT a step in the problem-solving process?

(Multiple Choice)
4.7/5
(44)

One form of online vandalism is ____________________operations,which interfere with or disrupt systems to protest the operations,policies,or actions of an organization or government agency.

(Multiple Choice)
4.8/5
(36)

Acts of ____________________can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

(Multiple Choice)
4.9/5
(36)

List the steps that can be used as a basic blueprint for solving organizational problems.

(Essay)
5.0/5
(50)

The first step in solving problems is to gather facts and make assumptions.

(True/False)
4.9/5
(36)

A(n)____________________ hacks the public telephone network to make free calls or disrupt services.

(Short Answer)
4.9/5
(41)

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines?

(Multiple Choice)
4.9/5
(36)

The malicious code attack includes the execution of viruses,worms,Trojan horses,and active Web scripts with the intent to destroy or steal information._________________________

(True/False)
4.9/5
(42)

Which of the following is not among the 'deadly sins of software security'?

(Multiple Choice)
4.8/5
(38)

The authorization process takes place before the authentication process.

(True/False)
4.8/5
(33)

List the specialized areas of security.

(Essay)
4.9/5
(33)

Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives?

(Multiple Choice)
4.8/5
(45)

List and explain the critical characteristics of information as defined by the C.I.A.triad.

(Essay)
4.9/5
(41)

When voltage levels lag(experience a momentary increase),the extra voltage can severely damage or destroy equipment._________________________

(True/False)
4.9/5
(29)

The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication._________________________

(True/False)
4.8/5
(37)

The set of organizational guidelines that dictates certain behavior within the organization is called ____________________.

(Short Answer)
4.8/5
(28)
Showing 41 - 60 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)