Exam 1: Introduction to the Management of Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is unsolicited commercial e-mail.

Free
(Short Answer)
5.0/5
(50)
Correct Answer:
Verified

Spam

Explain the differences between a leader and a manager.

Free
(Essay)
4.9/5
(34)
Correct Answer:
Verified

The distinctions between a leader and a manager arise in the execution of organizational tasks.A leader provides purpose,direction,and motivation to those that follow.By comparison,a manager administers the resources of the organization.He or she creates budgets,authorizes expenditures,and hires employees.

A(n)____________________ is an act against an asset that could result in a loss.

Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Verified

attack

Which type of attack involves sending a large number of connection or information requests to a target? 

(Multiple Choice)
4.8/5
(32)

The first step in solving problems is to gather facts and make assumptions.

(True/False)
4.9/5
(34)

Human error or failure often can be prevented with training,ongoing awareness activities, and ____________________.

(Multiple Choice)
4.8/5
(30)

A(n)____________________ is a potential weakness in an asset or its defensive control(s).

(Short Answer)
4.8/5
(35)

ESD is the acronym for ____________________ discharge.

(Short Answer)
4.7/5
(32)

The three levels of planning are strategic planning,tactical planning,and ____________________ planning.

(Short Answer)
4.7/5
(36)

A(n)polymorphic threat is one that over time changes the way it appears to antivirus software programs,making it undetectable by techniques that look for pre-configured signatures.

(True/False)
4.9/5
(26)

The macro virus infects the key operating system files located in a computer's start up sector.

(True/False)
4.8/5
(39)

A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

(Multiple Choice)
4.9/5
(34)

Which of the following is the principle of management that develops,creates,and implements strategies for the accomplishment of objectives? 

(Multiple Choice)
4.9/5
(46)

List the specialized areas of security.

(Essay)
4.9/5
(29)

List the steps that can be used as a basic blueprint for solving organizational problems.

(Essay)
4.9/5
(34)

Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? 

(Multiple Choice)
4.9/5
(34)

Some information gathering techniques are quite legal,for example,using a Web browser to perform market research.These legal techniques are called,collectively,competitive ____________________.

(Short Answer)
4.9/5
(40)

A short-term interruption in electrical power availability is known as a ____.

(Multiple Choice)
4.8/5
(33)

As frustrating as viruses and worms are,perhaps more time and money is spent on resolving virus ____________________.

(Multiple Choice)
4.8/5
(37)

When voltage levels lag (experience a momentary increase),the extra voltage can severely damage or destroy equipment.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)