Guide to Network Security

Computing

Quiz 1 :

Introduction to Information Security

Quiz 1 :

Introduction to Information Security

Question Type
search
arrow
By balancing information security and access, a completely secure information system can be created.
Free
True False
Answer:

Answer:

False

Tags
Choose question tag
close menu
arrow
The value of information comes from the characteristics it possesses.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
Which security project team role is filled by a senior executive who promotes the project and ensures that it is supported, both financially and administratively, at the highest levels of the organization?
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
The security blueprint is a detailed version of the security framework.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which individual interferes with or disrupts systems to protest the operations, policies, or actions of an organization or government agency?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which e-mail attack occurs when an attacker routes large quantities of e-mail to the target system?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which attack is used when a copy of the hash of the user's password has been obtained?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
An unlocked door is an example of a(n) ____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
The McCumber Cube provides a ____ description of the architectural approach widely used in computer and information security.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
In information security, ____ exists when a vulnerability known to an attacker is present.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
One of the basic tenets of security architectures is the spheres of security.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which resource is a physical asset?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which term identifies a single instance of an information asset suffering damage, unintended or unauthorized modification, or disclosure?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which term describes a subject or object's ability to use, manipulate, modify, or affect another subject or object?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
The CIA triad is based on three characteristics of information that form the foundation for many security programs: ____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
An indirect attack involves a hacker using a personal computer to break into a system.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A(n) ____ is an application error that occurs when more data is sent to a buffer than it can handle.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which threat is the most common intellectual property (IP) breach?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Organizations must minimize ____ to match their risk appetite.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which individual is considered to be a script kiddie who uses automated tools to inundate a Web site with a barrage of network traffic, usually resulting in a denial of service?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 50