Question 1
Information has __________ when it is free from mistakes or errors and has the value that the end user expects.Selected Answer: 
 AccuracyCorrect Answer: 
 AccuracyQuestion 2
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.Selected Answer: 
 PhysicalCorrect Answer: 
 PhysicalQuestion 3
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.Selected Answer: 
 CISOCorrect Answer: 
 CISOQuestion 4
____ of information is the quality or state of being genuine or original.Selected Answer: 
 AuthenticityCorrect Answer: 
 AuthenticityQuestion 5
The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 6
During which phase of the security systems development life cycle (SecSDLC) would an in-depth examination of the current threats and controls take place?Selected Answer: 
 AnalysisCorrect Answer: 
 AnalysisQuestion 7
Information has __________ when it is whole, complete, and uncorrupted.Selected Answer: 
 IntegrityCorrect Answer: 
 IntegrityQuestion 8
Information security can be an absolute.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 9
A(n) __________ is an organizational resource that is being protected.Selected Answer: 
 AssetCorrect Answer: 
 AssetQuestion 10
A(n) __________ is a weakness or fault in a system or protection mechanism that opens it to attack or damage.Selected Answer: 
 VulnerabilityCorrect Answer: 
 VulnerabilityQuestion 11
In a(n) __________ attack, a system is compromised and used to attack other systems.Selected Answer: 
 IndirectCorrect Answer: 
 IndirectQuestion 12
When a computer is the subject of an attack, it is the entity being attacked.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 13
An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization.Selected Answer: 
 All of the aboveCorrect Answer: 
 All of the aboveQuestion 14
A breach of possession always results in a breach of confidentiality.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 15
To achieve balance — that is, to operate an information system that satisfies the user and the security professional — the security level must allow reasonable access, yet protect against threats.Selected Answer: 
 TrueCorrect Answer: 
 True
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH1
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment