Filters
Question type

Study Flashcards

Network security focuses on the protection of the details of a particular operation or series of activities.

A) True
B) False

Correct Answer

verifed

verified

In an organization,the value of ____________________ of information is especially high when it involves personal information about employees,customers,or patients.

Correct Answer

verifed

verified

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triangle.

Correct Answer

verifed

verified

CIA
C.I.A.
Confident...

View Answer

During the ____________________ War,many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.

Correct Answer

verifed

verified

Hardware is the physical technology that houses and executes the software,stores and transports the data,and provides interfaces for the entry and removal of information from the system._________________________

A) True
B) False

Correct Answer

verifed

verified

Which of the following phases is the longest and most expensive phase of the systems development life cycle?


A) investigation
B) logical design
C) implementation
D) maintenance and change

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Of the two approaches to information security implementation,the top-down approach has a higher probability of success._________________________

A) True
B) False

Correct Answer

verifed

verified

An information system is the entire set of ____,people,procedures,and networks that make possible the use of information resources in the organization.


A) software
B) hardware
C) data
D) All of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Using a methodology increases the probability of success.

A) True
B) False

Correct Answer

verifed

verified

____________________ carries the lifeblood of information through an organization.

Correct Answer

verifed

verified

The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

A) True
B) False

Correct Answer

verifed

verified

The history of information security begins with the history of ____________________ security.

Correct Answer

verifed

verified

Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.

A) True
B) False

Correct Answer

verifed

verified

A computer is the ____ of an attack when it is used to conduct the attack.


A) subject
B) object
C) target
D) facilitator

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Outline types of data ownership and their respective responsibilities.

Correct Answer

verifed

verified

Data owners: Those responsible for the s...

View Answer

List and describe the six phases of the security systems development life cycle.

Correct Answer

verifed

verified

Investigation
The investigation phase of...

View Answer

During the early years,information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.

Correct Answer

verifed

verified

Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects._________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 78 of 78

Related Exams

Show Answer