Filters
Question type

Study Flashcards

____ was the first operating system to integrate security as its core functions.


A) UNIX
B) DOS
C) MULTICS
D) ARPANET

Correct Answer

verifed

verified

The possession of information is the quality or state of having value for some purpose or end.

Correct Answer

verifed

verified

False

A(n)____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.

Correct Answer

verifed

verified

Information has ____________________ when it is whole,complete,and uncorrupted.

Correct Answer

verifed

verified

The value of information comes from the characteristics it possesses.

Correct Answer

verifed

verified

An e-mail virus involves sending an e-mail message with a modified field.

Correct Answer

verifed

verified

Confidentiality ensures that only those with the rights and privileges to access information are able to do so._________________________

Correct Answer

verifed

verified

A(n) ____ attack is a hacker using a personal computer to break into a system.


A) indirect
B) direct
C) software
D) hardware

Correct Answer

verifed

verified

The ____________________ phase consists primarily of assessments of the organization,its current systems,and its capability to support the proposed systems.

Correct Answer

verifed

verified

A(n)project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas._________________________

Correct Answer

verifed

verified

True

In the ____________________ approach,the project is initiated by upper-level managers who issue policy,procedures and processes,dictate the goals and expected outcomes,and determine accountability for each required action.

Correct Answer

verifed

verified

In general,protection is "the quality or state of being secure-to be free from danger." _________________________

Correct Answer

verifed

verified

A data custodian works directly with data owners and is responsible for the storage,maintenance,and protection of the information.

Correct Answer

verifed

verified

Recently,many states have implemented legislation making certain computer-related activities illegal.

Correct Answer

verifed

verified

True

The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ____________________.

Correct Answer

verifed

verified

The most successful kind of top-down approach involves a formal development strategy referred to as a ____.


A) systems design
B) development life project
C) systems development life cycle
D) systems schema

Correct Answer

verifed

verified

The ____ is the individual primarily responsible for the assessment,management,and implementation of information security in the organization.


A) ISO
B) CIO
C) CISO
D) CTO

Correct Answer

verifed

verified

____________________ of information is the quality or state of being genuine or original,rather than a reproduction or fabrication.

Correct Answer

verifed

verified

The primary threats to security during the early years of computers were physical theft of equipment,espionage against the products of the systems,and sabotage.

Correct Answer

verifed

verified

A frequently overlooked component of an IS,____________________ are written instructions for accomplishing a specific task.

Correct Answer

verifed

verified

Showing 1 - 20 of 78

Related Exams

Show Answer