Exam 1: Computer Systems Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The assurance that data received are exactly as sent by an authorized entity is __________.

(Multiple Choice)
4.9/5
(34)

Establishing, maintaining, and implementing plans for emergency response, backup operations, and post disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations is a __________ plan.

(Short Answer)
4.9/5
(30)

__________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.

(Short Answer)
4.8/5
(41)

X.800 architecture was developed as an international standard andfocuses on security in the context of networks and communications.

(True/False)
4.9/5
(44)

A(n) _________ is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.

(Short Answer)
4.8/5
(37)

A loss of _________ is the disruption of access to or use of information or an information system.

(Short Answer)
4.7/5
(26)

A threat action in which sensitive data are directly released to an unauthorized entity is __________.

(Multiple Choice)
4.7/5
(29)

Replay, masquerade, modification of messages, and denial of service are example of _________ attacks.

(Short Answer)
4.8/5
(28)

Confidentiality, Integrity, and Availability form what is often referred to as the _____.

(Short Answer)
4.7/5
(35)

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

(Multiple Choice)
4.9/5
(42)

The "A" in the CIA triad stands for "authenticity".

(True/False)
4.8/5
(25)

A(n) _________ is any means taken to deal with a security attack.

(Short Answer)
4.9/5
(43)

The first step in devising security services and mechanisms is todevelop a security policy.

(True/False)
4.9/5
(30)

The more critical a component or service, the higher the level ofavailability required.

(True/False)
4.8/5
(30)

Security mechanisms typically do not involve more than one particularalgorithm or protocol.

(True/False)
4.8/5
(30)

A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.

(Multiple Choice)
4.8/5
(28)

In the United States, student grade information is an asset whose confidentiality is regulated by the __________.

(Essay)
4.9/5
(36)

A(n) _________ assessment is periodically assessing the risk to organizational operations, organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission or organizational information.

(Short Answer)
5.0/5
(33)

Many security administrators view strong security as an impediment toefficient and user-friendly operation of an information system.

(True/False)
4.9/5
(42)

Threats are attacks carried out.

(True/False)
4.9/5
(30)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)