Exam 1: Introduction to the Management of Information Security
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance.
(True/False)
4.9/5
(30)
Corruption of information can occur only while information is being stored.
(True/False)
4.8/5
(43)
Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls?
(Multiple Choice)
4.7/5
(40)
A device (or a software program on a computer)that can monitor data traveling on a network is known as a socket sniffer.
(True/False)
4.9/5
(44)
Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n)____.
(Multiple Choice)
4.7/5
(38)
Which of the following is NOT a primary function of Information Security Management?
(Multiple Choice)
4.8/5
(32)
A virus or worm can have a payload that installs a(n)____________________ door or trap door component in a system,which allows the attacker to access the system at will with special privileges.
(Short Answer)
4.7/5
(41)
A(n)____________________ hacks the public telephone network to make free calls or disrupt services.
(Short Answer)
4.9/5
(41)
The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack.
(True/False)
4.9/5
(37)
Which of the following is a C.I.A.characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information?
(Multiple Choice)
4.7/5
(39)
List and explain the four principles of management under the contemporary or popular management theory.Briefly define each.
(Essay)
4.8/5
(44)
One form of online vandalism is ____________________ operations,which interfere with or disrupt systems to protest the operations,policies,or actions of an organization or government agency.
(Multiple Choice)
4.8/5
(36)
What are the three distinct groups of decision makers or communities of interest on an information security team?
(Essay)
4.9/5
(31)
A ____________ overflow is an application error that occurs when the system can't handle the amount of data that is sent.
(Short Answer)
4.9/5
(38)
____________________ are malware programs that hide their true nature,and reveal their designed behavior only when activated.
(Multiple Choice)
4.8/5
(34)
In the ____________________ attack,an attacker monitors (or sniffs)packets from the network,modifies them,and inserts them back into the network.
(Multiple Choice)
4.9/5
(42)
Which of the following is the first step in the problem-solving process?
(Multiple Choice)
5.0/5
(37)
According to the C.I.A.triad,which of the following is a desirable characteristic for computer security?
(Multiple Choice)
4.7/5
(31)
Showing 41 - 60 of 63
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)