Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Security Operations and Management
Exam 6: Information, Communications, and Computer Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.
Question 2
Multiple Choice
________ property is defined as information created through research and development.
Question 3
Multiple Choice
________ involves information risk assessment and intelligence activities in a process whereby operations are analyzed to identify vulnerabilities.
Question 4
True/False
INFOSEC views operations from an adversary's perspective in an effort to seek out an organization's vulnerabilities and protect its critical information.
Question 5
True/False
Computer crime is generally defined as any crime committed with computer technology.
Question 6
Multiple Choice
_______ security involves the use of non-exclusive codes and ciphers to transform transmitted data to render it unintelligible.
Question 7
Multiple Choice
Communications ________ security involves prevention of adverse surveillance by devices such as microphones.
Question 8
Multiple Choice
According to the United States ________, critical information includes all forms and types of financial, business, scientific, economic, or engineering information.
Question 9
Multiple Choice
The ________ involves collaboration among several organizations and provides operations security training to agencies and businesses.
Question 10
Essay
What is the purpose of information security (INFOSEC)?
Question 11
Multiple Choice
________ includes all efforts to protect information transmitted by voice, wire, satellite, and other systems from unauthorized interception.
Question 12
Multiple Choice
________ information policies remind staff of special agreements created to maintain confidentiality and rights to privacy.
Question 13
True/False
According to John Carroll's "simple security principle" for safeguarding sensitive computer information, no person should view information that has a classification that exceeds the viewer's security clearance.