Anda di halaman 1dari 3

Question 1

1 out of 1 points A breach of possession always results in a breach of confidentiality. Answer Selected Answer: Correct Answer: False False 1 out of 1 points Information security can be an absolute. Answer Selected Answer: Correct Answer: False False 1 out of 1 points To achieve balance that is, to operate an information system that satisfies the user and the security professional the security level must allow reasonable access, yet protect against threats. Answer Selected Answer: Correct Answer: True True 1 out of 1 points The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage. Answer Selected Answer: Correct Answer: True True 1 out of 1 points When a computer is the subject of an attack, it is the entity being attacked. Answer Selected Answer: Correct Answer: False False 2 out of 2 points ____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse. Answer Selected Answer: Physical Correct Answer: Physical

Question 2

Question 3

Question 4

Question 5

Question 6

Question 7
2 out of 2 points ____ of information is the quality or state of being genuine or original. Answer Selected Answer: Authenticity

Correct Answer: Authenticity

Question 8
2 out of 2 points An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization. Answer Selected Answer: All of the above Correct Answer: All of the above

Question 9
2 out of 2 points The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization. Answer Selected Answer: CISO Correct Answer: CISO

Question 10
2 out of 2 points Information has __________ when it is free from mistakes or errors and has the value that the end user expects. Answer Selected Answer: Accuracy Correct Answer: Accuracy

Question 11
2 out of 2 points Information has __________ when it is whole, complete, and uncorrupted. Answer Selected Answer: Integrity Correct Answer: Integrity

Question 12
2 out of 2 points In a(n) __________ attack, a system is compromised and used to attack other systems. Answer Selected Answer: Indirect Correct Answer: Indirect

Question 13
2 out of 2 points A(n) __________ is an organizational resource that is being protected.

Answer Selected Answer: Asset Correct Answer: Asset

Question 14
2 out of 2 points A(n) __________ is a weakness or fault in a system or protection mechanism that opens it to attack or damage. Answer Selected Answer: Vulnerability Correct Answer: Vulnerability

Question 15
2 out of 2 points During which phase of the security systems development life cycle (SecSDLC) would an in-depth examination of the current threats and controls take place? Answer Selected Answer: Analysis Correct Answer: Analysis Sunday, June 3, 2012 12:34:53 AM EDT