Content
User Hien Tran Course CIS 481-20: INTRO TO INFORM SECURITY-Summer 2012 Test Quiz 1 - Team Started 5/31/12 1:17 PM Submitted 5/31/12 1:21 PM Status Completed Score 25 out of 25 points Time Elapsed 3 minutes. Instructions Please answer each question carefully.
false
Question 1
1 out of 1 points
A breach of possession always results in a breach of confidentiality. Answer Selected Answer: Correct Answer: False False
Question 2
1 out of 1 points
Information security can be an absolute. Answer Selected Answer: Correct Answer: False False
Question 3
1 out of 1 points
To achieve balance that is, to operate an information system that satisfies the user and the security professional the security level must allow reasonable access, yet protect against threats. Answer Selected Answer: Correct Answer: True True
Question 4
1 out of 1 points
The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage. Answer Selected Answer: Correct Answer: True True
Question 5
1 out of 1 points
When a computer is the subject of an attack, it is the entity being attacked. Answer Selected Answer: Correct Answer: False False
Question 6
2 out of 2 points
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse. Answer Selected Answer: Physical Correct Answer: Physical
Question 7
2 out of 2 points
____ of information is the quality or state of being genuine or original. Answer Selected Answer: Authenticity Correct Answer: Authenticity
Question 8
2 out of 2 points
An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization. Answer
Selected Answer: All of the above Correct Answer: All of the above
Question 9
2 out of 2 points
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization. Answer Selected Answer: CISO Correct Answer: CISO
Question 10
2 out of 2 points
Information has __________ when it is free from mistakes or errors and has the value that the end user expects. Answer Selected Answer: Accuracy Correct Answer: Accuracy
Question 11
2 out of 2 points
Information has __________ when it is whole, complete, and uncorrupted. Answer Selected Answer: Integrity Correct Answer: Integrity
Question 12
2 out of 2 points
In a(n) __________ attack, a system is compromised and used to attack other systems.
Question 13
2 out of 2 points
A(n) __________ is an organizational resource that is being protected. Answer Selected Answer: Asset Correct Answer: Asset
Question 14
2 out of 2 points
A(n) __________ is a weakness or fault in a system or protection mechanism that opens it to attack or damage. Answer Selected Answer: Vulnerability Correct Answer: Vulnerability
Question 15
2 out of 2 points
During which phase of the security systems development life cycle (SecSDLC) would an in-depth examination of the current threats and controls take place? Answer Selected Answer: Analysis Correct Answer: Analysis
Friday, June 1, 2012 10:04:44 AM EDT