Question 1
During which phase of the security systems development life cycle (SecSDLC) would an in-depth examination of the current threats and controls take place?Selected Answer: 
 
AnalysisCorrect Answer: 
 AnalysisQuestion 2
Information security can be an absolute assurance.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 3
A breach of possession always results in a breach of confidentiality.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 4
____ is simply how often you expect a specific type of attack to occur over the course of a year.Selected Answer: 
 
AROCorrect Answer: 
 AROQuestion 5
With the theft of electronic information, the evidence of a crime is readily apparent to the average end user.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 6
Calculate the Annualized Loss Expectancy for a threat that costs $500 per incident and is expected to occur once per week. Enter the calculated number below (just the number, no $, no commas). Recall, ALE = SLE * ARO .Selected Answer: 
 26000Correct Answer: 
 26,000Answer range +/- 0 (26000.0 - 26000.0)Question 7
____ are software programs that hide their true nature, and reveal their designed behavior only when activated.Selected Answer: 
 
Trojan horsesCorrect Answer: 
 Trojan horsesQuestion 8
Information has __________ when it is whole, complete, and uncorrupted.Selected Answer: 
 
IntegrityCorrect Answer: 
 IntegrityQuestion 9
A computer is the ____ of an attack when it is used to conduct the attack.Selected Answer: 
 
subjectCorrect Answer: 
 subjectQuestion 10
____ of information is the quality or state of being genuine or original.Selected Answer: 
 
AuthenticityCorrect Answer: 
 AuthenticityQuestion 11
To achieve balance — that is, to operate an information system that satisfies the user and the security professional — the security level must allow reasonable access, yet protect against threats.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 12
__________ is the redirection of legitimate Web traffic to an illegitimate site for the purpose of obtaining private information, often by exploiting the Domain Name Server system so that it transforms a legitimate host name into the invalid site's IP address.Selected Answer: 
 
PharmingCorrect Answer: 
 PharmingQuestion 13
If every vulnerability identified in the organization is handled through the acceptance risk strategy, it may reflect an inability to conduct proactive security activities and an apathetic approach to security in general.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 14
In the Paul-Elder model of critical thinking, there are several universal intellectual standards that are applied to thinking to assess its quality. Match each intellectual standard with its associated description.Question Correct Match Selected Match Clarity
 D. 
Understandable, the meaning can be grasped
 D. 
Understandable, the meaning can be graspedAccuracy
 A. 
Free from errors or distortions
 A. 
Free from errors or distortionsQuestion 15
Information has __________ when it is free from mistakes or errors and has the value that the end user expects.Selected Answer: 
 
AccuracyCorrect Answer: 
 AccuracyQuestion 16
____ feasibility determines what can and cannot occur based on the consensus and relationships among the communities of interest.Selected Answer: 
 
OperationalCorrect Answer: 
 PoliticalQuestion 17
____ law represents a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people.Selected Answer: 
 
CivilCorrect Answer: 
 CivilQuestion 18
The top-down approach to information security has a higher probability of success than the bottom-up approach.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 19
A(n) disaster recovery plan dictates the actions an organization can and perhaps should take while an incident is in progress.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 20
The ____ Portability and Accountability Act Of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.Selected Answer: 
 
Health InsuranceCorrect Answer: 
 Health InsuranceQuestion 21
A key difference between laws and ethics is that ethics carry the sanctions of a governing authority and laws do not.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 22
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.Selected Answer: 
 
PhysicalCorrect Answer: 
 PhysicalQuestion 23
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.Selected Answer: 
 
ZombiesCorrect Answer: 
 ZombiesQuestion 24
A(n) ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.Selected Answer: 
 
distributed denial-of-serviceCorrect Answer: 
 distributed denial-of-service
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY EXAM 1
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment