Filters
Question type

Study Flashcards

Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, often referred to as the bottom-up approach. _________________________

A) True
B) False

Correct Answer

verifed

verified

Information security can be an absolute.

A) True
B) False

Correct Answer

verifed

verified

E-mail spoofing involves sending an e-mail message with a harmful attachment.

A) True
B) False

Correct Answer

verifed

verified

The investigation phase of the SDLC involves specification of the objectives, constraints, andscope of the project.

A) True
B) False

Correct Answer

verifed

verified

The possession of information is the quality or state of having value for some purpose or end.

A) True
B) False

Correct Answer

verifed

verified

When unauthorized individuals or systems can view information, confidentiality is breached. _________________________

A) True
B) False

Correct Answer

verifed

verified

Which of the following phases is often considered the longest and most expensive phase of the systems development life cycle  


A)  investigation
B)  logical design 
C)  implementation
D)  maintenance and change

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

When a computer is the subject of an attack, it is the entity being attacked.

A) True
B) False

Correct Answer

verifed

verified

The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.

Correct Answer

verifed

verified

__________ was the first operating system to integrate security as one of its core functions.


A)  UNIX
B)  DOS 
C)  MULTICS
D)  ARPANET

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization.


A)  software
B)  hardware 
C)  data
D)  All of the above

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.

Correct Answer

verifed

verified

A breach of possession may not always result in a breach of confidentiality.

A) True
B) False

Correct Answer

verifed

verified

The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

A) True
B) False

Correct Answer

verifed

verified

In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures, and processes, dictate the goals and expected outcomes, and determine accountability for each required action.

Correct Answer

verifed

verified

The physical design is the blueprint for the desired solution.

A) True
B) False

Correct Answer

verifed

verified

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.

Correct Answer

verifed

verified

CIAC.I.A.Confidentia...

View Answer

In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.

Correct Answer

verifed

verified

A computer is the ____________________ of an attack when it is the entity being targeted.

Correct Answer

verifed

verified

During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks, so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.

Correct Answer

verifed

verified

Showing 41 - 60 of 87

Related Exams

Show Answer