Question 1
Information has __________ when it is free from mistakes or errors and has the value that the end user expects.Selected Answer:
AccuracyCorrect Answer:
AccuracyQuestion 2
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.Selected Answer:
PhysicalCorrect Answer:
PhysicalQuestion 3
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.Selected Answer:
CISOCorrect Answer:
CISOQuestion 4
____ of information is the quality or state of being genuine or original.Selected Answer:
AuthenticityCorrect Answer:
AuthenticityQuestion 5
The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.Selected Answer:
TrueCorrect Answer:
TrueQuestion 6
During which phase of the security systems development life cycle (SecSDLC) would an in-depth examination of the current threats and controls take place?Selected Answer:
AnalysisCorrect Answer:
AnalysisQuestion 7
Information has __________ when it is whole, complete, and uncorrupted.Selected Answer:
IntegrityCorrect Answer:
IntegrityQuestion 8
Information security can be an absolute.Selected Answer:
FalseCorrect Answer:
FalseQuestion 9
A(n) __________ is an organizational resource that is being protected.Selected Answer:
AssetCorrect Answer:
AssetQuestion 10
A(n) __________ is a weakness or fault in a system or protection mechanism that opens it to attack or damage.Selected Answer:
VulnerabilityCorrect Answer:
VulnerabilityQuestion 11
In a(n) __________ attack, a system is compromised and used to attack other systems.Selected Answer:
IndirectCorrect Answer:
IndirectQuestion 12
When a computer is the subject of an attack, it is the entity being attacked.Selected Answer:
FalseCorrect Answer:
FalseQuestion 13
An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization.Selected Answer:
All of the aboveCorrect Answer:
All of the aboveQuestion 14
A breach of possession always results in a breach of confidentiality.Selected Answer:
FalseCorrect Answer:
FalseQuestion 15
To achieve balance — that is, to operate an information system that satisfies the user and the security professional — the security level must allow reasonable access, yet protect against threats.Selected Answer:
TrueCorrect Answer:
True
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH1
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment