Filters
Question type

Study Flashcards

A(n)_________________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.

Correct Answer

verifed

verified

community ...

View Answer

Risk evaluation is the process of identifying,assessing,and evaluating the levels of risk facing the organization,specifically the threats to the organization's security and to the information stored and processed by the organization._________________________

A) True
B) False

Correct Answer

verifed

verified

The ____ model consists of six general phases.


A) pitfall
B) 5SA&D
C) waterfall
D) SysSP

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

A computer is the ____________________ of an attack when it is the target entity.

Correct Answer

verifed

verified

The ____ is a methodology for the design and implementation of an information system in an organization.


A) DSLC
B) SDLC
C) LCSD
D) CLSD

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Information security can be an absolute.

A) True
B) False

Correct Answer

verifed

verified

A famous study entitled "Protection Analysis: Final Report" was published in ____.


A) 1868
B) 1978
C) 1988
D) 1998

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.

A) True
B) False

Correct Answer

verifed

verified

In file hashing,a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.


A) key
B) hashing
C) hash
D) code

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Describe the multiple types of security systems present in many organizations.

Correct Answer

verifed

verified

A successful organization should have th...

View Answer

MULTICS stands for Multiple Information and Computing Service._________________________

A) True
B) False

Correct Answer

verifed

verified

The roles of information security professionals are aligned with the goals and mission of the information security community of interest.

A) True
B) False

Correct Answer

verifed

verified

In information security,salami theft occurs when an employee steals a few pieces of information at a time,knowing that taking more would be noticed - but eventually the employee gets something complete or useable._________________________

A) True
B) False

Correct Answer

verifed

verified

A breach of possession always results in a breach of confidentiality.

A) True
B) False

Correct Answer

verifed

verified

____ security addresses the issues necessary to protect the tangible items,objects,or areas of an organization from unauthorized access and misuse.


A) Physical
B) Personal
C) Object
D) Standard

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

____ is the predecessor to the Internet.


A) NIST
B) ARPANET
C) FIPS
D) DES

E) None of the above
F) All of the above

Correct Answer

verifed

verified

To achieve balance - that is,to operate an information system that satisfies the user and the security professional - the security level must allow reasonable access,yet protect against threats.

A) True
B) False

Correct Answer

verifed

verified

____ of information is the quality or state of being genuine or original.


A) Authenticity
B) Spoofing
C) Confidentiality
D) Authorization

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat._________________________

A) True
B) False

Correct Answer

verifed

verified

Organizations are moving toward more ____-focused development approaches,seeking to improve not only the functionality of the systems they have in place,but consumer confidence in their product.


A) security
B) reliability
C) accessibility
D) availability

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 78

Related Exams

Show Answer