Deck 1: Introduction to Information Security

Full screen (f)
exit full mode
Question
When a computer is the subject of an attack, it is the entity being attacked.
Use Space or
up arrow
down arrow
to flip the card.
Question
In the physical design phase, specific technologies are selected.
Question
Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
Question
To achieve balance-that is, to operate an information system that satisfies the user and the security professional-the security level must allow reasonable access, yet protect against threats.
Question
The water-ski model is a type of SDLC in which each phase of the process flows from the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.
Question
During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage.
Question
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
Question
A breach of possession may not always result in a breach of confidentiality.
Question
The value of information comes from the characteristics it possesses.
Question
Information security can be an absolute.
Question
A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in project management and information security technical requirements.
Question
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
Question
The bottom-up approach to information security has a higher probability of success than the top-down approach.
Question
The investigation phase of the SDLC involves specification of the objectives, constraints, andscope of the project.
Question
The physical design is the blueprint for the desired solution.
Question
E-mail spoofing involves sending an e-mail message with a harmful attachment.
Question
Using a methodology will usually have no effect on the probability of success.
Question
The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.
Question
The possession of information is the quality or state of having value for some purpose or end.
Question
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
Question
__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.

A) Physical
B) Personal 
C) Object
D) Standard
Question
MULTICS stands for Multiple Information and Computing Service. _________________________
Question
Confidentiality ensures that only those with the rights and privileges to access information are able to do so. _________________________
Question
A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. _________________________
Question
__________ is a network project that preceded the Internet.

A) NIST
B) ARPANET 
C) FIPS
D) DES
Question
A(n) hardware system is the entire set of people, procedures, and technology that enable business to use information. _________________________
Question
Of the two approaches to information security implementation, the top-down approach has a higher probability of success. _________________________
Question
Key end users should be assigned to a developmental team, known as the united application development team. _________________________
Question
Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________
Question
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, often referred to as the bottom-up approach. _________________________
Question
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. _________________________
Question
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects. _________________________
Question
__________ was the first operating system to integrate security as one of its core functions.

A) UNIX
B) DOS 
C) MULTICS
D) ARPANET
Question
When unauthorized individuals or systems can view information, confidentiality is breached. _________________________
Question
A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.

A) indirect
B) direct 
C) software
D) hardware
Question
According to the CNSS, networking is "the protection of information and its critical elements." _________________________
Question
The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

A) bugs
B) vulnerabilities 
C) malware
D) maintenance hooks
Question
The Analysis phase of the SDLC examines the event or plan that initiates the process and specifies the objectives, constraints, and scope of the project. _________________________
Question
Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. _________________________
Question
SecOps focuses on integrating the need for the development team to provide iterative and
rapid improvements to system functionality and the need for the operations team to improve
security and minimize the disruption from software release cycles. _________________________
Question
During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.

A) investigation
B) implementation 
C) analysis
D) physical design
Question
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

A) ​communications security  
B) ​network security 
C) ​physical security 
D) ​information security
Question
An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.

A) access method 
B) asset 
C) exploit 
D) risk
Question
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.

A) ​communications security  
B) ​network security 
C) ​physical security 
D) ​information security
Question
Organizations are moving toward more __________-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.

A) security
B) reliability 
C) accessibility
D) availability
Question
The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.

A) conceptual
B) logical 
C) integral
D) physical
Question
A methodology and formal development strategy for the design and implementation of an information system is referred to as a __________.

A) systems design
B) development life project 
C) systems development life cycle
D) systems schema
Question
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.

A) access 
B) assets 
C) exploits 
D) risk
Question
An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization.

A) software
B) hardware 
C) data
D) All of the above
Question
​The protection of all communications media, technology, and content is known as ___________.

A) ​communications security  
B) ​network security 
C) ​physical security 
D) ​information security
Question
Which of the following is a valid type of role when it comes to data ownership  

A) Data owners
B) Data custodians 
C) Data users
D) All of the above
Question
__________ of information is the quality or state of being genuine or original.

A) Authenticity
B) Spoofing 
C) Confidentiality
D) Authorization
Question
A type of SDLC in which each phase has results that flow into the next phase is called the  __________ model.

A) pitfall
B) SA&D 
C) waterfall
D) Method 7
Question
Which of the following phases is often considered the longest and most expensive phase of the systems development life cycle  

A) investigation
B) logical design 
C) implementation
D) maintenance and change
Question
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.

A) ISO
B) CIO 
C) CISO
D) CTO
Question
An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.

A) SDLC
B) DevOps 
C) JAD/RAD
D) SecOps
Question
__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.

A) NIST SP 800-12
B) NSTISSI No. 4011 
C) IEEE 802.11(g)
D) ISO 17788
Question
People with the primary responsibility for administering the systems that house the information used by the organization perform the role of ____.

A) Security policy developers 
B) Security professionals 
C) System administrators 
D) End users
Question
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.

A) result
B) smashing 
C) hash
D) code
Question
A computer is the __________ of an attack when it is used to conduct an attack against another computer.

A) subject
B) object 
C) target
D) facilitator
Question
The ____________________ component of an information system comprises applications, operating systems, and assorted command utilities.
Question
The history of information security begins with the concept of ____________________ security.
Question
In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.
Question
____________________ enables authorized users-people or computer systems-to access information without interference or obstruction and to receive it in the required format.
Question
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.
Question
A computer is the ____________________ of an attack when it is the entity being targeted.
Question
The senior technology officer is typically the chief ____________________ officer.
Question
Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.
Question
In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures, and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
Question
A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.
Question
The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
Question
A technique used to compromise a system is known as a(n) ___________.

A) access method 
B) asset 
C) exploit 
D) risk
Question
A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.
Question
During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
Question
____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
Question
The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.
Question
The ____________________ of information is the quality or state of ownership or control of some object or item.
Question
During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks, so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
Question
During the  ____________________ phase of the systems life cycle, the process begins by examining theevent or plan that initiated the process. During this phase, the objectives, constraints, and scope of the project are specified.
Question
Information has ____________________ when it is whole, complete, and uncorrupted.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/87
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to Information Security
1
When a computer is the subject of an attack, it is the entity being attacked.
False
2
In the physical design phase, specific technologies are selected.
True
3
Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
False
4
To achieve balance-that is, to operate an information system that satisfies the user and the security professional-the security level must allow reasonable access, yet protect against threats.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
5
The water-ski model is a type of SDLC in which each phase of the process flows from the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
6
During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
7
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
8
A breach of possession may not always result in a breach of confidentiality.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
9
The value of information comes from the characteristics it possesses.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
10
Information security can be an absolute.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
11
A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in project management and information security technical requirements.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
12
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
13
The bottom-up approach to information security has a higher probability of success than the top-down approach.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
14
The investigation phase of the SDLC involves specification of the objectives, constraints, andscope of the project.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
15
The physical design is the blueprint for the desired solution.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
16
E-mail spoofing involves sending an e-mail message with a harmful attachment.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
17
Using a methodology will usually have no effect on the probability of success.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
18
The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
19
The possession of information is the quality or state of having value for some purpose or end.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
20
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
21
__________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.

A) Physical
B) Personal 
C) Object
D) Standard
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
22
MULTICS stands for Multiple Information and Computing Service. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
23
Confidentiality ensures that only those with the rights and privileges to access information are able to do so. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
25
__________ is a network project that preceded the Internet.

A) NIST
B) ARPANET 
C) FIPS
D) DES
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) hardware system is the entire set of people, procedures, and technology that enable business to use information. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
27
Of the two approaches to information security implementation, the top-down approach has a higher probability of success. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
28
Key end users should be assigned to a developmental team, known as the united application development team. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
29
Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
30
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, often referred to as the bottom-up approach. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
31
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
32
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
33
__________ was the first operating system to integrate security as one of its core functions.

A) UNIX
B) DOS 
C) MULTICS
D) ARPANET
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
34
When unauthorized individuals or systems can view information, confidentiality is breached. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
35
A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.

A) indirect
B) direct 
C) software
D) hardware
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
36
According to the CNSS, networking is "the protection of information and its critical elements." _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
37
The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

A) bugs
B) vulnerabilities 
C) malware
D) maintenance hooks
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
38
The Analysis phase of the SDLC examines the event or plan that initiates the process and specifies the objectives, constraints, and scope of the project. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
39
Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
40
SecOps focuses on integrating the need for the development team to provide iterative and
rapid improvements to system functionality and the need for the operations team to improve
security and minimize the disruption from software release cycles. _________________________
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
41
During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.

A) investigation
B) implementation 
C) analysis
D) physical design
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
42
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

A) ​communications security  
B) ​network security 
C) ​physical security 
D) ​information security
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
43
An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer system, hardware, or other tangible object. Either way, the resource is known as a(n) ___________.

A) access method 
B) asset 
C) exploit 
D) risk
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
44
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.

A) ​communications security  
B) ​network security 
C) ​physical security 
D) ​information security
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
45
Organizations are moving toward more __________-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.

A) security
B) reliability 
C) accessibility
D) availability
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
46
The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.

A) conceptual
B) logical 
C) integral
D) physical
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
47
A methodology and formal development strategy for the design and implementation of an information system is referred to as a __________.

A) systems design
B) development life project 
C) systems development life cycle
D) systems schema
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
48
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.

A) access 
B) assets 
C) exploits 
D) risk
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
49
An information system is the entire set of __________, people, procedures, and networks that enable the use of information resources in the organization.

A) software
B) hardware 
C) data
D) All of the above
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
50
​The protection of all communications media, technology, and content is known as ___________.

A) ​communications security  
B) ​network security 
C) ​physical security 
D) ​information security
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is a valid type of role when it comes to data ownership  

A) Data owners
B) Data custodians 
C) Data users
D) All of the above
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
52
__________ of information is the quality or state of being genuine or original.

A) Authenticity
B) Spoofing 
C) Confidentiality
D) Authorization
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
53
A type of SDLC in which each phase has results that flow into the next phase is called the  __________ model.

A) pitfall
B) SA&D 
C) waterfall
D) Method 7
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following phases is often considered the longest and most expensive phase of the systems development life cycle  

A) investigation
B) logical design 
C) implementation
D) maintenance and change
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
55
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.

A) ISO
B) CIO 
C) CISO
D) CTO
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
56
An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.

A) SDLC
B) DevOps 
C) JAD/RAD
D) SecOps
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
57
__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.

A) NIST SP 800-12
B) NSTISSI No. 4011 
C) IEEE 802.11(g)
D) ISO 17788
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
58
People with the primary responsibility for administering the systems that house the information used by the organization perform the role of ____.

A) Security policy developers 
B) Security professionals 
C) System administrators 
D) End users
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
59
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.

A) result
B) smashing 
C) hash
D) code
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
60
A computer is the __________ of an attack when it is used to conduct an attack against another computer.

A) subject
B) object 
C) target
D) facilitator
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
61
The ____________________ component of an information system comprises applications, operating systems, and assorted command utilities.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
62
The history of information security begins with the concept of ____________________ security.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
63
In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ enables authorized users-people or computer systems-to access information without interference or obstruction and to receive it in the required format.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
65
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
66
A computer is the ____________________ of an attack when it is the entity being targeted.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
67
The senior technology officer is typically the chief ____________________ officer.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
68
Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
69
In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures, and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
70
A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
71
The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
72
A technique used to compromise a system is known as a(n) ___________.

A) access method 
B) asset 
C) exploit 
D) risk
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
73
A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
74
During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
75
____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
76
The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
77
The ____________________ of information is the quality or state of ownership or control of some object or item.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
78
During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks, so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
79
During the  ____________________ phase of the systems life cycle, the process begins by examining theevent or plan that initiated the process. During this phase, the objectives, constraints, and scope of the project are specified.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
80
Information has ____________________ when it is whole, complete, and uncorrupted.
Unlock Deck
Unlock for access to all 87 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 87 flashcards in this deck.