Filters
Question type

Study Flashcards

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -People responsible for the security and use of a particular set of information.

Correct Answer

verifed

verified

List the four important organizational functions an information security program performs.

Correct Answer

verifed

verified

An information security program performs...

View Answer

A(n) ____ is an application error that occurs when more data is sent to a buffer than it can handle.


A) timing attack
B) application control list
C) dictionary attack
D) buffer overflow

Correct Answer

verifed

verified

By balancing information security and access, a completely secure information system can be created.

Correct Answer

verifed

verified

False

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -A term meaning information remains whole, complete, and uncorrupted.

Correct Answer

verifed

verified

When organizations record versions of their policy in English and alternate languages, they are attempting to meet the ____ criteria to make the policy effective and legally enforceable.


A) Comprehension (understanding)
B) Compliance (agreement)
C) Review (reading)
D) Dissemination (distribution)

Correct Answer

verifed

verified

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -The protection of information from disclosure or exposure to unauthorized individuals or systems.

Correct Answer

verifed

verified

Describe the purpose of the Security Area Working Group and RFC 2196.

Correct Answer

verifed

verified

The Security Area Working Group acts as ...

View Answer

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -Enables authorized users to access information without interference or obstruction, and to receive it in the required format.

Correct Answer

verifed

verified

C

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -End users who work with the information to perform their daily jobs supporting the mission of the organization, and who therefore share the responsibility for data security.

Correct Answer

verifed

verified

Implementing multiple types of technology and thereby preventing the failure of one system from compromising the security of information is referred to as ____________________.

Correct Answer

verifed

verified

Which individual interferes with or disrupts systems to protest the operations, policies, or actions of an organization or government agency?


A) Cyberterrorist
B) Packet monkey
C) Phreaker
D) Hacktivist

Correct Answer

verifed

verified

An enterprise information security policy (EISP) is also known as a(n) ____.


A) issue-specific security policy
B) general security policy
C) systems-specific security policy
D) strategic planning policy

Correct Answer

verifed

verified

Define social engineering and briefly describe how it is accomplished.

Correct Answer

verifed

verified

Within the context of information securi...

View Answer

The CIA triad is based on three characteristics of information that form the foundation for many security programs: ____.


A) confidentiality, integrity, and asset
B) confidentiality, integrity, and availability
C) confidentiality, information, and availability
D) communication, information, and asset

Correct Answer

verifed

verified

Organizations must minimize ____ to match their risk appetite.


A) threats
B) access
C) risk
D) loss

Correct Answer

verifed

verified

C

Which term describes a subject or object's ability to use, manipulate, modify, or affect another subject or object?


A) Attack
B) Possession
C) Exploit
D) Access

Correct Answer

verifed

verified

____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages whose IP addresses indicate to the recipient that the messages are coming from a trusted host.

Correct Answer

verifed

verified

How does a distributed denial-of-service (DDoS) attack work and why are they so dangerous?

Correct Answer

verifed

verified

A distributed denial-of-service (DDoS) l...

View Answer

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -A term referring to the quality or state of being genuine or original rather than a reproduction or fabrication.

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer