Exam 1: Introduction to the Management of Information Security
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Duplication of software-based intellectual property is more commonly known as software ____________________.
(Short Answer)
4.9/5
(46)
Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
(Multiple Choice)
4.9/5
(32)
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines?
(Multiple Choice)
4.9/5
(27)
Which of the following is not among the 'deadly sins of software security'?
(Multiple Choice)
4.9/5
(31)
Blackmail threat of informational disclosure is an example of which threat category?
(Multiple Choice)
4.8/5
(38)
The authorization process takes place before the authentication process.
(True/False)
4.7/5
(30)
A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach,so that users who subsequently visit those sites become infected.
(True/False)
4.7/5
(26)
Which of the following is NOT a step in the problem-solving process?
(Multiple Choice)
5.0/5
(34)
Communications security involves the protection of which of the following?.
(Multiple Choice)
4.8/5
(38)
The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of which process?
(Multiple Choice)
4.9/5
(39)
The malicious code attack includes the execution of viruses,worms,Trojan horses,and active Web scripts with the intent to destroy or steal information.
(True/False)
4.9/5
(34)
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
(True/False)
4.7/5
(35)
What do audit logs that track user activity on an information system provide?
(Multiple Choice)
4.9/5
(30)
List the measures that are commonly used to protect the confidentiality of information.
(Essay)
4.9/5
(33)
The set of organizational guidelines that dictates certain behavior within the organization is called ____________________.
(Short Answer)
4.8/5
(34)
"4-1-9" fraud is an example of a ____________________ attack.
(Multiple Choice)
4.9/5
(44)
Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives?
(Multiple Choice)
4.8/5
(34)
Attempting to reverse-calculate a password is called ____________________.
(Short Answer)
4.7/5
(38)
Showing 21 - 40 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)