Tuesday, January 14, 2014

CIS 481-20: INTRO TO INFORM SECURITY CH1

  • Question 1

    2 out of 2 points
    Information has __________ when it is free from mistakes or errors and has the value that the end user expects.
    Selected Answer:
    Correct 
    Accuracy
    Correct Answer:
    Correct Accuracy
  • Question 2

    2 out of 2 points
    ____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
    Selected Answer:
    Correct 
    Physical
    Correct Answer:
    Correct Physical
  • Question 3

    2 out of 2 points
    The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.
    Selected Answer:
    Correct 
    CISO
    Correct Answer:
    Correct CISO
  • Question 4

    2 out of 2 points
    ____ of information is the quality or state of being genuine or original.
    Selected Answer:
    Correct 
    Authenticity
    Correct Answer:
    Correct Authenticity
  • Question 5

    1 out of 1 points
    The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 6

    2 out of 2 points
    During which phase of the security systems development life cycle (SecSDLC) would an in-depth examination of the current threats and controls take place?
    Selected Answer:
    Correct 
    Analysis
    Correct Answer:
    Correct Analysis
  • Question 7

    2 out of 2 points
    Information has __________ when it is whole, complete, and uncorrupted.
    Selected Answer:
    Correct 
    Integrity
    Correct Answer:
    Correct Integrity
  • Question 8

    1 out of 1 points
    Information security can be an absolute.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 9

    2 out of 2 points
    A(n) __________ is an organizational resource that is being protected.
    Selected Answer:
    Correct 
    Asset
    Correct Answer:
    Correct Asset
  • Question 10

    2 out of 2 points
    A(n) __________ is a weakness or fault in a system or protection mechanism that opens it to attack or damage.
    Selected Answer:
    Correct 
    Vulnerability
    Correct Answer:
    Correct Vulnerability
  • Question 11

    2 out of 2 points
    In a(n) __________ attack, a system is compromised and used to attack other systems.
    Selected Answer:
    Correct 
    Indirect
    Correct Answer:
    Correct Indirect
  • Question 12

    1 out of 1 points
    When a computer is the subject of an attack, it is the entity being attacked.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 13

    2 out of 2 points
    An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization.
    Selected Answer:
    Correct 
    All of the above
    Correct Answer:
    Correct All of the above
  • Question 14

    1 out of 1 points
    A breach of possession always results in a breach of confidentiality.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 15

    1 out of 1 points
    To achieve balance — that is, to operate an information system that satisfies the user and the security professional — the security level must allow reasonable access, yet protect against threats.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True

No comments:

Post a Comment