Filters
Question type

Study Flashcards

The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.


A)  bugs
B)  vulnerabilities 
C)  malware
D)  maintenance hooks

Correct Answer

verifed

verified

Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects. _________________________

Correct Answer

verifed

verified

Outline types of data ownership and their respective responsibilities.

Correct Answer

verifed

verified

Working directly with data owners, data custodians are responsible for the storage, maintenance, and protection of the information. The duties of a data custodian often include overseeing data storage and backups, implementing the specific procedures and policies laid out in the security policies and plans, and reporting to the data owner. Data users: End users who work with the information to perform their daily jobs supporting the mission of the organization. Data users are included as individuals with an information security role.

__________ is a network project that preceded the Internet.


A)  NIST
B)  ARPANET 
C)  FIPS
D)  DES

Correct Answer

verifed

verified

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________

Correct Answer

verifed

verified

The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.

Correct Answer

verifed

verified

Describe the multiple types of security systems present in many organizations.

Correct Answer

verifed

verified

A successful organization should have th...

View Answer

The senior technology officer is typically the chief ____________________ officer.

Correct Answer

verifed

verified

A(n) hardwaresystem is the entire set of people, procedures, and technology that enable business to use information. _________________________

Correct Answer

verifed

verified

An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.


A)  access method 
B)  asset 
C)  exploit 
D)  risk

Correct Answer

verifed

verified

A(n) ____________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.

Correct Answer

verifed

verified

community ...

View Answer

A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.

Correct Answer

verifed

verified

SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functionality and the need for the operations team to improve security and minimize the disruption from software release cycles. _________________________

Correct Answer

verifed

verified

Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.

Correct Answer

verifed

verified

project

A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. _________________________

Correct Answer

verifed

verified

Which of the following is a valid type of role when it comes to data ownership  


A)  Data owners
B)  Data custodians 
C)  Data users
D)  All of the above

Correct Answer

verifed

verified

Confidentiality ensures that only those with the rights and privileges to access information are able to do so. _________________________

Correct Answer

verifed

verified

Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.

Correct Answer

verifed

verified

____________________ enables authorized users-people or computer systems-to access information without interference or obstruction and to receive it in the required format.

Correct Answer

verifed

verified

Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ​_________.

Correct Answer

verifed

verified

threat​

Showing 1 - 20 of 87

Related Exams

Show Answer