Deck 1: Introduction to the Management of Information Security

Full screen (f)
exit full mode
Question
Project team members may require special training on newly introduced technologies,and this may increase the risk of human resource turnover because personnel trained in a new,high-demand skill are more likely to leave the organization in search of better opportunities elsewhere.
Use Space or
up arrow
down arrow
to flip the card.
Question
Unlike ongoing operations,project management involves the short-term gathering of a group that completes the project,and whose members are then released,and perhaps assigned to other projects.
Question
The authorization process takes place before the authentication process.
Question
The C.I.A.triangle is an important element of the CNSS model of information security.
Question
Leadership includes supervising employee behavior,performance,attendance and attitude.
Question
When you review technological feasibility,you address the organization's financial ability to purchase the technology needed to implement a candidate solution
Question
Only a deliberate attack,such as a virus,can result in the corruption of a file.
Question
The set of organizational guidelines that dictate certain behavior within the organization is called planning.
Question
A manager is responsible for coordinating the completion of tasks.
Question
A manager has many roles to play including informational,interpersonal,and decisional.
Question
Changing only one of the project plan elements does not usually affect the accuracy and reliability of the estimates of the other two.
Question
Information security can be both a process and a project because it is in fact a continuous series of projects.
Question
The first step in solving problems is to gather facts and make assumptions.
Question
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
Question
The CNSS security model includes detailed guidelines and policies that direct the implementation of controls.
Question
Both autocratic and democratic leaders tend to be action-oriented.
Question
Information technology is the sole responsibility of a small,dedicated group of people in a company.
Question
Tactical planning focuses on the day-to-day operation of local resources.
Question
All managers are expected to play a leadership role.
Question
Corruption of information can occur only while information is being stored.
Question
The  integrity  \text {\underline{ integrity } }
of information is threatened when it is exposed to corruption,damage,or destruction._________________________
Question
In the WBS approach,a project plan is first broken down into a small tasks or specific action steps.
Question
The three desirable characteristics of information on which the C.I.A.triangle is founded are confidentiality,integrity,and  authorization \text {\underline{ authorization} }
_________________________
Question
The process of achieving objectives using a given set of resources is called  management  \text {\underline{ management } }
._________________________
Question
 Leadership \text {\underline{ Leadership} }
generally addresses the direction and motivation of the human resource._________________________
Question
Any project manager is better served using a tool they know,rather than an overly complex one that he or she cannot use suitably.
Question
Democratic  \text {\underline{Democratic } }

leaders tend to make decisions only when they are needed to avoid bringing the process to a complete halt._________________________
Question
The two network scheduling techniques,the Critical Path Method and PERT,are similar in design.
Question
An effective project management software application is capable of eliminating the need for a project manager.
Question
The characteristic of information that enables a user to access it without interference or obstruction and in a useable format is  confidentiality  \text {\underline{ confidentiality } }

._________________________
Question
Autocratic  \text {\underline{Autocratic } }

leaders typically seek input from all interested parties,and then formulate a position that can be supported by the majority._________________________
Question
During the  identification \text {\underline{ identification} }

process,a control provides proof that a user possesses the identity that he or she claims._________________________
Question
 Network  \text {\underline{ Network } }
security encompasses strategies to protect people,tangible assets,and the workplace from various threats._________________________
Question
Popular management theory categorizes the principles of management into planning,organizing,leading and  controlling \text {\underline{ controlling} }
._________________________
Question
Communications  \text {\underline{Communications } }

security addresses the protection of an organization's data networking devices,connections,and contents._________________________
Question
 Operations \underline { \text { Operations } }

security focuses on securing the organization's ability to carry out its operational activities without interruption or compromise._________________________
Question
The first step in solving problems is to recognize and  gather facts about \text {\underline{ gather facts about} }
the problem._________________________
Question
The protection of an organization's information assets is the primary mission of the information technology community._________________________
Question
A project can have more than one critical path.
Question
An information system that is able to recognize the identity of individual users is said to provide authentication  \text {\underline{authentication } }

_________________________
Question
Training project team members on how to use new technologies when they are introduced  decreases  \text {\underline{ decreases } }

the risk of human resource turnover._________________________
Question
One method for sequencing tasks and subtasks in a project plan is known as  Web \text {\underline{ Web} }

scheduling,referring to the collection of possible pathways to project completion from the beginning task to the ending task._________________________
Question
In reviewing behavior feasibility,you assess a candidate solution according to the likelihood that  management \text {\underline{ management} }
will adopt and support a solution,rather than resisting it._________________________
Question
A group of decision makers and/or working professionals is known as a(n)____.

A) area of interest
B) decision partner
C) community of interest
D) source of interest
Question
Policies  \text {\underline{Policies } }

are InfoSec operations that are specifically managed as separate entities._________________________
Question
Another popular project management tool is the bar or McCumber  \text {\underline{McCumber } }
chart,named for its developer,who created this method in the early 1900s._________________________
Question
The ____ community has the lead role in protecting the organization's information assets.

A) information technology
B) information security
C) general business
D) general public
Question
Activity definition is a process in the knowledge area of time  \text {\underline{time } }

,in project management methodology._________________________
Question
The ____ community allocates resources necessary for all of to the communities of interest to function properly.

A) information security
B) information technology
C) general business
D) general public
Question
Communications security involves the protection of an organization's ____.

A) employees
B) physical assets
C) technology
D) data network devices
Question
The first step in the WBS is to identify the work to be accomplished in the task or task area; that is,the activities and constraints.  \text {\underline{constraints. } }

._________________________
Question
During the project execution phase,the positive  \text {\underline{positive } }

feedback loop or cybernetic loop ensures that progress is measured periodically._________________________
Question
WBS is a simple planning tool used to create a(n) project plan  \text {\underline{project plan } }

._________________________
Question
 Operations  \text {\underline{ Operations } }

are discrete sequences of activities with starting points and defined completion points._________________________
Question
Administrative closure is a process in the knowledge area of  communications \text {\underline{ communications} }

,in project management methodology._________________________
Question
Physical security is concerned with the protection of the ____.

A) people within the organization
B) physical assets of the organization
C) network devices of the organization
D) data of the organization
Question
Among the advantages to the PERT  \text {\underline{PERT } }

method is planning large projects is made easier by facilitating the identification of pre- and post- activities._________________________
Question
The project plan inputs include work time,resources and project  activities \text {\underline{ activities} }

._________________________
Question
The most popular of networking dependency diagramming techniques is the  Program Evaluation and Review Technique (PERT) \text {\underline{ Program Evaluation and Review Technique (PERT)} }
,similar to the Critical Path Method._________________________
Question
The ____ community supplies and supports information technology appropriate to a business needs.

A) information security
B) information technology
C) general business
D) general public
Question
Autocratic leaders usually ____.

A) seek input from all interested parties
B) request ideas and suggestions
C) do not accept alternative viewpoints
D) sit back and allow the process to develop as it goes
Question
Identification is typically performed by means of a(n)____.

A) audit log
B) user name
C) cryptographic certificate
D) access control list
Question
____ security addresses the ability to use the network to accomplish the organization's data communication functions.

A) Communications
B) Network
C) Operations
D) Physical
Question
The activation and use of access control lists is an example of the ____ process.

A) identification
B) accountability
C) authorization
D) authentication
Question
____ occurs when a control provides proof that a user possesses the identity that he or she claims.

A) Identification
B) Authentication
C) Authorization
D) Accountability
Question
Audit logs that track user activity on an information system provide ____.

A) identification
B) authorization
C) accountability
D) authentication
Question
A manager has informational,interpersonal,and ____ roles within the organization.

A) decisional
B) creative
C) security related
D) leadership
Question
According to the C.I.A.triangle,the three desirable characteristics of information are confidentiality,integrity,and ____.

A) accountability
B) availability
C) authorization
D) authentication
Question
The characteristic of ____ exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process.

A) accountability
B) privacy
C) authorization
D) authentication
Question
Strategic planning ____.

A) focuses on production planning
B) occurs at the highest levels of the organization
C) focuses on the day-to-day operation of local resources
D) occurs in the short or immediate term
Question
The process that develops,creates,and implements strategies for the accomplishment of objectives is called ____.

A) leading
B) controlling
C) organizing
D) planning
Question
____ leaders are also known as "laid-back" leaders.

A) Autocratic
B) Laissez-faire
C) Democratic
D) Aristocratic
Question
During the transmission of information,algorithms,hash values,and error-correcting codes help ensure the ____ of the information.

A) confidentiality
B) integrity
C) corruption
D) availability
Question
The protection of information and the systems and hardware that use,store,and transmit that information is known as ____.

A) security
B) information security
C) authentication
D) identification
Question
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information.

A) Integrity
B) Availability
C) Authentication
D) Confidentiality
Question
____ leaders reserve all decision-making responsibilities for themselves.

A) Autocratic
B) Democratic
C) Laissez-faire
D) Diplomatic
Question
The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of the ____ process.

A) accountability
B) authorization
C) identification
D) authentication
Question
The ____ of information refers to the ability to access information without interference or obstruction and in a useable format.

A) privacy
B) confidentiality
C) integrity
D) availability
Question
____ is the quality or state of being whole,complete,and uncorrupted.

A) Integrity
B) Authorization
C) Security
D) Confidentiality
Question
An information system possesses the characteristic of ____ when it is able to recognize individual users.

A) authentication
B) identification
C) authorization
D) accountability
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/139
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to the Management of Information Security
1
Project team members may require special training on newly introduced technologies,and this may increase the risk of human resource turnover because personnel trained in a new,high-demand skill are more likely to leave the organization in search of better opportunities elsewhere.
False
2
Unlike ongoing operations,project management involves the short-term gathering of a group that completes the project,and whose members are then released,and perhaps assigned to other projects.
True
3
The authorization process takes place before the authentication process.
False
4
The C.I.A.triangle is an important element of the CNSS model of information security.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
5
Leadership includes supervising employee behavior,performance,attendance and attitude.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
6
When you review technological feasibility,you address the organization's financial ability to purchase the technology needed to implement a candidate solution
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
7
Only a deliberate attack,such as a virus,can result in the corruption of a file.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
8
The set of organizational guidelines that dictate certain behavior within the organization is called planning.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
9
A manager is responsible for coordinating the completion of tasks.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
10
A manager has many roles to play including informational,interpersonal,and decisional.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
11
Changing only one of the project plan elements does not usually affect the accuracy and reliability of the estimates of the other two.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
12
Information security can be both a process and a project because it is in fact a continuous series of projects.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
13
The first step in solving problems is to gather facts and make assumptions.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
14
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
15
The CNSS security model includes detailed guidelines and policies that direct the implementation of controls.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
16
Both autocratic and democratic leaders tend to be action-oriented.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
17
Information technology is the sole responsibility of a small,dedicated group of people in a company.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
18
Tactical planning focuses on the day-to-day operation of local resources.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
19
All managers are expected to play a leadership role.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
20
Corruption of information can occur only while information is being stored.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
21
The  integrity  \text {\underline{ integrity } }
of information is threatened when it is exposed to corruption,damage,or destruction._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
22
In the WBS approach,a project plan is first broken down into a small tasks or specific action steps.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
23
The three desirable characteristics of information on which the C.I.A.triangle is founded are confidentiality,integrity,and  authorization \text {\underline{ authorization} }
_________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
24
The process of achieving objectives using a given set of resources is called  management  \text {\underline{ management } }
._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
25
 Leadership \text {\underline{ Leadership} }
generally addresses the direction and motivation of the human resource._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
26
Any project manager is better served using a tool they know,rather than an overly complex one that he or she cannot use suitably.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
27
Democratic  \text {\underline{Democratic } }

leaders tend to make decisions only when they are needed to avoid bringing the process to a complete halt._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
28
The two network scheduling techniques,the Critical Path Method and PERT,are similar in design.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
29
An effective project management software application is capable of eliminating the need for a project manager.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
30
The characteristic of information that enables a user to access it without interference or obstruction and in a useable format is  confidentiality  \text {\underline{ confidentiality } }

._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
31
Autocratic  \text {\underline{Autocratic } }

leaders typically seek input from all interested parties,and then formulate a position that can be supported by the majority._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
32
During the  identification \text {\underline{ identification} }

process,a control provides proof that a user possesses the identity that he or she claims._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
33
 Network  \text {\underline{ Network } }
security encompasses strategies to protect people,tangible assets,and the workplace from various threats._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
34
Popular management theory categorizes the principles of management into planning,organizing,leading and  controlling \text {\underline{ controlling} }
._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
35
Communications  \text {\underline{Communications } }

security addresses the protection of an organization's data networking devices,connections,and contents._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
36
 Operations \underline { \text { Operations } }

security focuses on securing the organization's ability to carry out its operational activities without interruption or compromise._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
37
The first step in solving problems is to recognize and  gather facts about \text {\underline{ gather facts about} }
the problem._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
38
The protection of an organization's information assets is the primary mission of the information technology community._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
39
A project can have more than one critical path.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
40
An information system that is able to recognize the identity of individual users is said to provide authentication  \text {\underline{authentication } }

_________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
41
Training project team members on how to use new technologies when they are introduced  decreases  \text {\underline{ decreases } }

the risk of human resource turnover._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
42
One method for sequencing tasks and subtasks in a project plan is known as  Web \text {\underline{ Web} }

scheduling,referring to the collection of possible pathways to project completion from the beginning task to the ending task._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
43
In reviewing behavior feasibility,you assess a candidate solution according to the likelihood that  management \text {\underline{ management} }
will adopt and support a solution,rather than resisting it._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
44
A group of decision makers and/or working professionals is known as a(n)____.

A) area of interest
B) decision partner
C) community of interest
D) source of interest
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
45
Policies  \text {\underline{Policies } }

are InfoSec operations that are specifically managed as separate entities._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
46
Another popular project management tool is the bar or McCumber  \text {\underline{McCumber } }
chart,named for its developer,who created this method in the early 1900s._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
47
The ____ community has the lead role in protecting the organization's information assets.

A) information technology
B) information security
C) general business
D) general public
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
48
Activity definition is a process in the knowledge area of time  \text {\underline{time } }

,in project management methodology._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
49
The ____ community allocates resources necessary for all of to the communities of interest to function properly.

A) information security
B) information technology
C) general business
D) general public
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
50
Communications security involves the protection of an organization's ____.

A) employees
B) physical assets
C) technology
D) data network devices
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
51
The first step in the WBS is to identify the work to be accomplished in the task or task area; that is,the activities and constraints.  \text {\underline{constraints. } }

._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
52
During the project execution phase,the positive  \text {\underline{positive } }

feedback loop or cybernetic loop ensures that progress is measured periodically._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
53
WBS is a simple planning tool used to create a(n) project plan  \text {\underline{project plan } }

._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
54
 Operations  \text {\underline{ Operations } }

are discrete sequences of activities with starting points and defined completion points._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
55
Administrative closure is a process in the knowledge area of  communications \text {\underline{ communications} }

,in project management methodology._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
56
Physical security is concerned with the protection of the ____.

A) people within the organization
B) physical assets of the organization
C) network devices of the organization
D) data of the organization
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
57
Among the advantages to the PERT  \text {\underline{PERT } }

method is planning large projects is made easier by facilitating the identification of pre- and post- activities._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
58
The project plan inputs include work time,resources and project  activities \text {\underline{ activities} }

._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
59
The most popular of networking dependency diagramming techniques is the  Program Evaluation and Review Technique (PERT) \text {\underline{ Program Evaluation and Review Technique (PERT)} }
,similar to the Critical Path Method._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
60
The ____ community supplies and supports information technology appropriate to a business needs.

A) information security
B) information technology
C) general business
D) general public
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
61
Autocratic leaders usually ____.

A) seek input from all interested parties
B) request ideas and suggestions
C) do not accept alternative viewpoints
D) sit back and allow the process to develop as it goes
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
62
Identification is typically performed by means of a(n)____.

A) audit log
B) user name
C) cryptographic certificate
D) access control list
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
63
____ security addresses the ability to use the network to accomplish the organization's data communication functions.

A) Communications
B) Network
C) Operations
D) Physical
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
64
The activation and use of access control lists is an example of the ____ process.

A) identification
B) accountability
C) authorization
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
65
____ occurs when a control provides proof that a user possesses the identity that he or she claims.

A) Identification
B) Authentication
C) Authorization
D) Accountability
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
66
Audit logs that track user activity on an information system provide ____.

A) identification
B) authorization
C) accountability
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
67
A manager has informational,interpersonal,and ____ roles within the organization.

A) decisional
B) creative
C) security related
D) leadership
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
68
According to the C.I.A.triangle,the three desirable characteristics of information are confidentiality,integrity,and ____.

A) accountability
B) availability
C) authorization
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
69
The characteristic of ____ exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process.

A) accountability
B) privacy
C) authorization
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
70
Strategic planning ____.

A) focuses on production planning
B) occurs at the highest levels of the organization
C) focuses on the day-to-day operation of local resources
D) occurs in the short or immediate term
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
71
The process that develops,creates,and implements strategies for the accomplishment of objectives is called ____.

A) leading
B) controlling
C) organizing
D) planning
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
72
____ leaders are also known as "laid-back" leaders.

A) Autocratic
B) Laissez-faire
C) Democratic
D) Aristocratic
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
73
During the transmission of information,algorithms,hash values,and error-correcting codes help ensure the ____ of the information.

A) confidentiality
B) integrity
C) corruption
D) availability
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
74
The protection of information and the systems and hardware that use,store,and transmit that information is known as ____.

A) security
B) information security
C) authentication
D) identification
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
75
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information.

A) Integrity
B) Availability
C) Authentication
D) Confidentiality
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
76
____ leaders reserve all decision-making responsibilities for themselves.

A) Autocratic
B) Democratic
C) Laissez-faire
D) Diplomatic
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
77
The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of the ____ process.

A) accountability
B) authorization
C) identification
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
78
The ____ of information refers to the ability to access information without interference or obstruction and in a useable format.

A) privacy
B) confidentiality
C) integrity
D) availability
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
79
____ is the quality or state of being whole,complete,and uncorrupted.

A) Integrity
B) Authorization
C) Security
D) Confidentiality
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
80
An information system possesses the characteristic of ____ when it is able to recognize individual users.

A) authentication
B) identification
C) authorization
D) accountability
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 139 flashcards in this deck.