Filters
Question type

Study Flashcards

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.


A)  ​communications security  
B)  ​network security 
C)  ​physical security 
D)  ​information security

Correct Answer

verifed

verified

__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.


A)  NIST SP 800-12
B)  NSTISSI No. 4011 
C)  IEEE 802.11(g)
D)  ISO 17788

Correct Answer

verifed

verified

According to the CNSS, networking is "the protection of information and its critical elements." _________________________

Correct Answer

verifed

verified

List and describe the phases of the traditional systems development life cycle.

Correct Answer

verifed

verified

InvestigationThe investigation phase beg...

View Answer

The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.

Correct Answer

verifed

verified

A technique used to compromise a system is known as a(n) ___________.


A)  access method 
B)  asset 
C)  exploit 
D)  risk

Correct Answer

verifed

verified

The bottom-up approach to information security has a higher probability of success than the top-down approach.

Correct Answer

verifed

verified

The value of information comes from the characteristics it possesses.

Correct Answer

verifed

verified

In the physical design phase, specific technologies are selected.

Correct Answer

verifed

verified

__________ of information is the quality or state of being genuine or original.


A)  Authenticity
B)  Spoofing 
C)  Confidentiality
D)  Authorization

Correct Answer

verifed

verified

A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.

Correct Answer

verifed

verified

MULTICS stands forMultiple Information and Computing Service. _________________________

Correct Answer

verifed

verified

The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.


A)  conceptual
B)  logical 
C)  integral
D)  physical

Correct Answer

verifed

verified

The history of information security begins with the concept of ____________________ security.

Correct Answer

verifed

verified

A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.


A)  indirect
B)  direct 
C)  software
D)  hardware

Correct Answer

verifed

verified

Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. _________________________

Correct Answer

verifed

verified

____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.

Correct Answer

verifed

verified

Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.

Correct Answer

verifed

verified

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. _________________________

Correct Answer

verifed

verified

​The protection of all communications media, technology, and content is known as ___________.


A)  ​communications security  
B)  ​network security 
C)  ​physical security 
D)  ​information security

Correct Answer

verifed

verified

Showing 61 - 80 of 87

Related Exams

Show Answer