Term
Access is ____________________.
|
|
Definition
A) a subject or an object's ability to use, manipulate, modify or affect another subject or object. |
|
|
Term
A threat is _________________________.
|
|
Definition
B) a category of objects, persons, or other entities that represents a danger to an asset |
|
|
Term
Vulnerability is _____________________________.
|
|
Definition
D) a weekness or fault in a system or protection mechanism |
|
|
Term
What are the three components of the C.I.A triangle
|
|
Definition
A) Integrity, Confidentiality, Availability |
|
|
Term
In Information Security, accuracy is the quality or state of being genuine or original.
|
|
Definition
|
|
Term
In Information Security, Integrity is when an information is whole, complete, and uncorrupted.
|
|
Definition
|
|
Term
Each of the following is a component of an Information System except ________________.
|
|
Definition
|
|
Term
Each of the following is a phase of a Security System Development Life Cycle except _________.
|
|
Definition
|
|
Term
Which one of the following is NOT an advantage of the bottom-up approach of the implementation of Information Security?
|
|
Definition
|
|
Term
Which one of the following is NOT an advantage of the top-down approach of the implementation of Information Security
|
|
Definition
|
|
Term
Data custidians are responsible for storage, maintenance, and protection of the information.
|
|
Definition
|
|
Term
Which one of the following is not a member of an Information Security Project Team?
|
|
Definition
|
|
Term
A community of interest is a group of individuals who are united by similar interests or values within an organization.
|
|
Definition
|
|
Term
Who has primary responsibility for the assessment, management, and implementation of information security in the organization.
|
|
Definition
|
|
Term
Which one of the following sentence is NOT true?
|
|
Definition
C) Information security is technology only. |
|
|
Term
Information Security is an art and science.
|
|
Definition
|
|
Term
Confidentiality is _____________________.
|
|
Definition
B) when information is protected from disclosure or exposure to unauthorized individuals or systems. |
|
|
Term
Operations security is used to protect which of the following?
|
|
Definition
C) The details of a particular operation or series of activities. |
|
|
Term
Phishing is when an attacker attempts to obtain personal or financial information using fraudulent means, most often by posing as another individual or organization.
|
|
Definition
|
|
Term
Availability is the quality or state of ownership or control.
|
|
Definition
|
|
Term
Of the two approaches to information security implementation, the top-down approach has a higher probability of success.
|
|
Definition
|
|
Term
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects.
|
|
Definition
|
|
Term
In information security, salami theft occurs when an employee steals a few pieces of information at a time, knowing that taking more would be noticed — but eventually the employee gets the whole thing.
|
|
Definition
|
|
Term
The ____ model consists of 6 general phases.
|
|
Definition
|
|
Term
Hardware is the physical technology that houses and executes the software, stores and carries the data, and provides interfaces for the entry and removal of information from the system.
|
|
Definition
|
|
Term
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems. This is often referred to as a bottom-up approach.
|
|
Definition
|
|
Term
____ of information is the quality or state of being genuine or original.
|
|
Definition
|
|
Term
A computer is the ____ of an attack when it is used to conduct the attack.
|
|
Definition
|
|
Term
The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.
|
|
Definition
|
|
Term
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a(n) ____ value.
|
|
Definition
|
|
Term
Which of the following is a valid type of data ownership?
|
|
Definition
|
|
Term
A methodology increases the probability of success.
|
|
Definition
|
|
Term
Key end users should be assigned to a developmental team, known as the united application development team.
|
|
Definition
|
|
Term
Organizations are moving toward more ____-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but the confidence of the consumer in their product.
|
|
Definition
|
|
Term
Which of the following phases is the longest and most expensive phase of the systems development life cycle?
|
|
Definition
D) maintenance and change |
|
|
Term
Information security can be an absolute.
|
|
Definition
|
|
Term
An E-mail virus involves sending an e-mail message with a modified field.
|
|
Definition
|
|
Term
The value of information comes from the characteristics it possesses.
|
|
Definition
|
|
Term
A breach of possession always results in a breach of confidentiality.
|
|
Definition
|
|
Term
____ is the origin of today’s Internet.
|
|
Definition
|
|