Deck 1: Introduction to the Management of Information Security

ملء الشاشة (f)
exit full mode
سؤال
Project team members may require special training on newly introduced technologies,and this may increase the risk of human resource turnover because personnel trained in a new,high-demand skill are more likely to leave the organization in search of better opportunities elsewhere.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Unlike ongoing operations,project management involves the short-term gathering of a group that completes the project,and whose members are then released,and perhaps assigned to other projects.
سؤال
The authorization process takes place before the authentication process.
سؤال
The C.I.A.triangle is an important element of the CNSS model of information security.
سؤال
Leadership includes supervising employee behavior,performance,attendance and attitude.
سؤال
When you review technological feasibility,you address the organization's financial ability to purchase the technology needed to implement a candidate solution
سؤال
Only a deliberate attack,such as a virus,can result in the corruption of a file.
سؤال
The set of organizational guidelines that dictate certain behavior within the organization is called planning.
سؤال
A manager is responsible for coordinating the completion of tasks.
سؤال
A manager has many roles to play including informational,interpersonal,and decisional.
سؤال
Changing only one of the project plan elements does not usually affect the accuracy and reliability of the estimates of the other two.
سؤال
Information security can be both a process and a project because it is in fact a continuous series of projects.
سؤال
The first step in solving problems is to gather facts and make assumptions.
سؤال
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
سؤال
The CNSS security model includes detailed guidelines and policies that direct the implementation of controls.
سؤال
Both autocratic and democratic leaders tend to be action-oriented.
سؤال
Information technology is the sole responsibility of a small,dedicated group of people in a company.
سؤال
Tactical planning focuses on the day-to-day operation of local resources.
سؤال
All managers are expected to play a leadership role.
سؤال
Corruption of information can occur only while information is being stored.
سؤال
The  integrity  \text {\underline{ integrity } }
of information is threatened when it is exposed to corruption,damage,or destruction._________________________
سؤال
In the WBS approach,a project plan is first broken down into a small tasks or specific action steps.
سؤال
The three desirable characteristics of information on which the C.I.A.triangle is founded are confidentiality,integrity,and  authorization \text {\underline{ authorization} }
_________________________
سؤال
The process of achieving objectives using a given set of resources is called  management  \text {\underline{ management } }
._________________________
سؤال
 Leadership \text {\underline{ Leadership} }
generally addresses the direction and motivation of the human resource._________________________
سؤال
Any project manager is better served using a tool they know,rather than an overly complex one that he or she cannot use suitably.
سؤال
Democratic  \text {\underline{Democratic } }

leaders tend to make decisions only when they are needed to avoid bringing the process to a complete halt._________________________
سؤال
The two network scheduling techniques,the Critical Path Method and PERT,are similar in design.
سؤال
An effective project management software application is capable of eliminating the need for a project manager.
سؤال
The characteristic of information that enables a user to access it without interference or obstruction and in a useable format is  confidentiality  \text {\underline{ confidentiality } }

._________________________
سؤال
Autocratic  \text {\underline{Autocratic } }

leaders typically seek input from all interested parties,and then formulate a position that can be supported by the majority._________________________
سؤال
During the  identification \text {\underline{ identification} }

process,a control provides proof that a user possesses the identity that he or she claims._________________________
سؤال
 Network  \text {\underline{ Network } }
security encompasses strategies to protect people,tangible assets,and the workplace from various threats._________________________
سؤال
Popular management theory categorizes the principles of management into planning,organizing,leading and  controlling \text {\underline{ controlling} }
._________________________
سؤال
Communications  \text {\underline{Communications } }

security addresses the protection of an organization's data networking devices,connections,and contents._________________________
سؤال
 Operations \underline { \text { Operations } }

security focuses on securing the organization's ability to carry out its operational activities without interruption or compromise._________________________
سؤال
The first step in solving problems is to recognize and  gather facts about \text {\underline{ gather facts about} }
the problem._________________________
سؤال
The protection of an organization's information assets is the primary mission of the information technology community._________________________
سؤال
A project can have more than one critical path.
سؤال
An information system that is able to recognize the identity of individual users is said to provide authentication  \text {\underline{authentication } }

_________________________
سؤال
Training project team members on how to use new technologies when they are introduced  decreases  \text {\underline{ decreases } }

the risk of human resource turnover._________________________
سؤال
One method for sequencing tasks and subtasks in a project plan is known as  Web \text {\underline{ Web} }

scheduling,referring to the collection of possible pathways to project completion from the beginning task to the ending task._________________________
سؤال
In reviewing behavior feasibility,you assess a candidate solution according to the likelihood that  management \text {\underline{ management} }
will adopt and support a solution,rather than resisting it._________________________
سؤال
A group of decision makers and/or working professionals is known as a(n)____.

A) area of interest
B) decision partner
C) community of interest
D) source of interest
سؤال
Policies  \text {\underline{Policies } }

are InfoSec operations that are specifically managed as separate entities._________________________
سؤال
Another popular project management tool is the bar or McCumber  \text {\underline{McCumber } }
chart,named for its developer,who created this method in the early 1900s._________________________
سؤال
The ____ community has the lead role in protecting the organization's information assets.

A) information technology
B) information security
C) general business
D) general public
سؤال
Activity definition is a process in the knowledge area of time  \text {\underline{time } }

,in project management methodology._________________________
سؤال
The ____ community allocates resources necessary for all of to the communities of interest to function properly.

A) information security
B) information technology
C) general business
D) general public
سؤال
Communications security involves the protection of an organization's ____.

A) employees
B) physical assets
C) technology
D) data network devices
سؤال
The first step in the WBS is to identify the work to be accomplished in the task or task area; that is,the activities and constraints.  \text {\underline{constraints. } }

._________________________
سؤال
During the project execution phase,the positive  \text {\underline{positive } }

feedback loop or cybernetic loop ensures that progress is measured periodically._________________________
سؤال
WBS is a simple planning tool used to create a(n) project plan  \text {\underline{project plan } }

._________________________
سؤال
 Operations  \text {\underline{ Operations } }

are discrete sequences of activities with starting points and defined completion points._________________________
سؤال
Administrative closure is a process in the knowledge area of  communications \text {\underline{ communications} }

,in project management methodology._________________________
سؤال
Physical security is concerned with the protection of the ____.

A) people within the organization
B) physical assets of the organization
C) network devices of the organization
D) data of the organization
سؤال
Among the advantages to the PERT  \text {\underline{PERT } }

method is planning large projects is made easier by facilitating the identification of pre- and post- activities._________________________
سؤال
The project plan inputs include work time,resources and project  activities \text {\underline{ activities} }

._________________________
سؤال
The most popular of networking dependency diagramming techniques is the  Program Evaluation and Review Technique (PERT) \text {\underline{ Program Evaluation and Review Technique (PERT)} }
,similar to the Critical Path Method._________________________
سؤال
The ____ community supplies and supports information technology appropriate to a business needs.

A) information security
B) information technology
C) general business
D) general public
سؤال
Autocratic leaders usually ____.

A) seek input from all interested parties
B) request ideas and suggestions
C) do not accept alternative viewpoints
D) sit back and allow the process to develop as it goes
سؤال
Identification is typically performed by means of a(n)____.

A) audit log
B) user name
C) cryptographic certificate
D) access control list
سؤال
____ security addresses the ability to use the network to accomplish the organization's data communication functions.

A) Communications
B) Network
C) Operations
D) Physical
سؤال
The activation and use of access control lists is an example of the ____ process.

A) identification
B) accountability
C) authorization
D) authentication
سؤال
____ occurs when a control provides proof that a user possesses the identity that he or she claims.

A) Identification
B) Authentication
C) Authorization
D) Accountability
سؤال
Audit logs that track user activity on an information system provide ____.

A) identification
B) authorization
C) accountability
D) authentication
سؤال
A manager has informational,interpersonal,and ____ roles within the organization.

A) decisional
B) creative
C) security related
D) leadership
سؤال
According to the C.I.A.triangle,the three desirable characteristics of information are confidentiality,integrity,and ____.

A) accountability
B) availability
C) authorization
D) authentication
سؤال
The characteristic of ____ exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process.

A) accountability
B) privacy
C) authorization
D) authentication
سؤال
Strategic planning ____.

A) focuses on production planning
B) occurs at the highest levels of the organization
C) focuses on the day-to-day operation of local resources
D) occurs in the short or immediate term
سؤال
The process that develops,creates,and implements strategies for the accomplishment of objectives is called ____.

A) leading
B) controlling
C) organizing
D) planning
سؤال
____ leaders are also known as "laid-back" leaders.

A) Autocratic
B) Laissez-faire
C) Democratic
D) Aristocratic
سؤال
During the transmission of information,algorithms,hash values,and error-correcting codes help ensure the ____ of the information.

A) confidentiality
B) integrity
C) corruption
D) availability
سؤال
The protection of information and the systems and hardware that use,store,and transmit that information is known as ____.

A) security
B) information security
C) authentication
D) identification
سؤال
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information.

A) Integrity
B) Availability
C) Authentication
D) Confidentiality
سؤال
____ leaders reserve all decision-making responsibilities for themselves.

A) Autocratic
B) Democratic
C) Laissez-faire
D) Diplomatic
سؤال
The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of the ____ process.

A) accountability
B) authorization
C) identification
D) authentication
سؤال
The ____ of information refers to the ability to access information without interference or obstruction and in a useable format.

A) privacy
B) confidentiality
C) integrity
D) availability
سؤال
____ is the quality or state of being whole,complete,and uncorrupted.

A) Integrity
B) Authorization
C) Security
D) Confidentiality
سؤال
An information system possesses the characteristic of ____ when it is able to recognize individual users.

A) authentication
B) identification
C) authorization
D) accountability
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/139
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to the Management of Information Security
1
Project team members may require special training on newly introduced technologies,and this may increase the risk of human resource turnover because personnel trained in a new,high-demand skill are more likely to leave the organization in search of better opportunities elsewhere.
False
2
Unlike ongoing operations,project management involves the short-term gathering of a group that completes the project,and whose members are then released,and perhaps assigned to other projects.
True
3
The authorization process takes place before the authentication process.
False
4
The C.I.A.triangle is an important element of the CNSS model of information security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
5
Leadership includes supervising employee behavior,performance,attendance and attitude.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
6
When you review technological feasibility,you address the organization's financial ability to purchase the technology needed to implement a candidate solution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
7
Only a deliberate attack,such as a virus,can result in the corruption of a file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
8
The set of organizational guidelines that dictate certain behavior within the organization is called planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
9
A manager is responsible for coordinating the completion of tasks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
10
A manager has many roles to play including informational,interpersonal,and decisional.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
11
Changing only one of the project plan elements does not usually affect the accuracy and reliability of the estimates of the other two.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
12
Information security can be both a process and a project because it is in fact a continuous series of projects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
13
The first step in solving problems is to gather facts and make assumptions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
14
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
15
The CNSS security model includes detailed guidelines and policies that direct the implementation of controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
16
Both autocratic and democratic leaders tend to be action-oriented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
17
Information technology is the sole responsibility of a small,dedicated group of people in a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
18
Tactical planning focuses on the day-to-day operation of local resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
19
All managers are expected to play a leadership role.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
20
Corruption of information can occur only while information is being stored.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
21
The  integrity  \text {\underline{ integrity } }
of information is threatened when it is exposed to corruption,damage,or destruction._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
22
In the WBS approach,a project plan is first broken down into a small tasks or specific action steps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
23
The three desirable characteristics of information on which the C.I.A.triangle is founded are confidentiality,integrity,and  authorization \text {\underline{ authorization} }
_________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
24
The process of achieving objectives using a given set of resources is called  management  \text {\underline{ management } }
._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
25
 Leadership \text {\underline{ Leadership} }
generally addresses the direction and motivation of the human resource._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
26
Any project manager is better served using a tool they know,rather than an overly complex one that he or she cannot use suitably.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
27
Democratic  \text {\underline{Democratic } }

leaders tend to make decisions only when they are needed to avoid bringing the process to a complete halt._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
28
The two network scheduling techniques,the Critical Path Method and PERT,are similar in design.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
29
An effective project management software application is capable of eliminating the need for a project manager.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
30
The characteristic of information that enables a user to access it without interference or obstruction and in a useable format is  confidentiality  \text {\underline{ confidentiality } }

._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
31
Autocratic  \text {\underline{Autocratic } }

leaders typically seek input from all interested parties,and then formulate a position that can be supported by the majority._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
32
During the  identification \text {\underline{ identification} }

process,a control provides proof that a user possesses the identity that he or she claims._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
33
 Network  \text {\underline{ Network } }
security encompasses strategies to protect people,tangible assets,and the workplace from various threats._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
34
Popular management theory categorizes the principles of management into planning,organizing,leading and  controlling \text {\underline{ controlling} }
._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
35
Communications  \text {\underline{Communications } }

security addresses the protection of an organization's data networking devices,connections,and contents._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
36
 Operations \underline { \text { Operations } }

security focuses on securing the organization's ability to carry out its operational activities without interruption or compromise._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
37
The first step in solving problems is to recognize and  gather facts about \text {\underline{ gather facts about} }
the problem._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
38
The protection of an organization's information assets is the primary mission of the information technology community._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
39
A project can have more than one critical path.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
40
An information system that is able to recognize the identity of individual users is said to provide authentication  \text {\underline{authentication } }

_________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
41
Training project team members on how to use new technologies when they are introduced  decreases  \text {\underline{ decreases } }

the risk of human resource turnover._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
42
One method for sequencing tasks and subtasks in a project plan is known as  Web \text {\underline{ Web} }

scheduling,referring to the collection of possible pathways to project completion from the beginning task to the ending task._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
43
In reviewing behavior feasibility,you assess a candidate solution according to the likelihood that  management \text {\underline{ management} }
will adopt and support a solution,rather than resisting it._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
44
A group of decision makers and/or working professionals is known as a(n)____.

A) area of interest
B) decision partner
C) community of interest
D) source of interest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
45
Policies  \text {\underline{Policies } }

are InfoSec operations that are specifically managed as separate entities._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
46
Another popular project management tool is the bar or McCumber  \text {\underline{McCumber } }
chart,named for its developer,who created this method in the early 1900s._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
47
The ____ community has the lead role in protecting the organization's information assets.

A) information technology
B) information security
C) general business
D) general public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
48
Activity definition is a process in the knowledge area of time  \text {\underline{time } }

,in project management methodology._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
49
The ____ community allocates resources necessary for all of to the communities of interest to function properly.

A) information security
B) information technology
C) general business
D) general public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
50
Communications security involves the protection of an organization's ____.

A) employees
B) physical assets
C) technology
D) data network devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
51
The first step in the WBS is to identify the work to be accomplished in the task or task area; that is,the activities and constraints.  \text {\underline{constraints. } }

._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
52
During the project execution phase,the positive  \text {\underline{positive } }

feedback loop or cybernetic loop ensures that progress is measured periodically._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
53
WBS is a simple planning tool used to create a(n) project plan  \text {\underline{project plan } }

._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
54
 Operations  \text {\underline{ Operations } }

are discrete sequences of activities with starting points and defined completion points._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
55
Administrative closure is a process in the knowledge area of  communications \text {\underline{ communications} }

,in project management methodology._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
56
Physical security is concerned with the protection of the ____.

A) people within the organization
B) physical assets of the organization
C) network devices of the organization
D) data of the organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
57
Among the advantages to the PERT  \text {\underline{PERT } }

method is planning large projects is made easier by facilitating the identification of pre- and post- activities._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
58
The project plan inputs include work time,resources and project  activities \text {\underline{ activities} }

._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
59
The most popular of networking dependency diagramming techniques is the  Program Evaluation and Review Technique (PERT) \text {\underline{ Program Evaluation and Review Technique (PERT)} }
,similar to the Critical Path Method._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
60
The ____ community supplies and supports information technology appropriate to a business needs.

A) information security
B) information technology
C) general business
D) general public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
61
Autocratic leaders usually ____.

A) seek input from all interested parties
B) request ideas and suggestions
C) do not accept alternative viewpoints
D) sit back and allow the process to develop as it goes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
62
Identification is typically performed by means of a(n)____.

A) audit log
B) user name
C) cryptographic certificate
D) access control list
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
63
____ security addresses the ability to use the network to accomplish the organization's data communication functions.

A) Communications
B) Network
C) Operations
D) Physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
64
The activation and use of access control lists is an example of the ____ process.

A) identification
B) accountability
C) authorization
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
65
____ occurs when a control provides proof that a user possesses the identity that he or she claims.

A) Identification
B) Authentication
C) Authorization
D) Accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
66
Audit logs that track user activity on an information system provide ____.

A) identification
B) authorization
C) accountability
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
67
A manager has informational,interpersonal,and ____ roles within the organization.

A) decisional
B) creative
C) security related
D) leadership
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
68
According to the C.I.A.triangle,the three desirable characteristics of information are confidentiality,integrity,and ____.

A) accountability
B) availability
C) authorization
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
69
The characteristic of ____ exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process.

A) accountability
B) privacy
C) authorization
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
70
Strategic planning ____.

A) focuses on production planning
B) occurs at the highest levels of the organization
C) focuses on the day-to-day operation of local resources
D) occurs in the short or immediate term
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
71
The process that develops,creates,and implements strategies for the accomplishment of objectives is called ____.

A) leading
B) controlling
C) organizing
D) planning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
72
____ leaders are also known as "laid-back" leaders.

A) Autocratic
B) Laissez-faire
C) Democratic
D) Aristocratic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
73
During the transmission of information,algorithms,hash values,and error-correcting codes help ensure the ____ of the information.

A) confidentiality
B) integrity
C) corruption
D) availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
74
The protection of information and the systems and hardware that use,store,and transmit that information is known as ____.

A) security
B) information security
C) authentication
D) identification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
75
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information.

A) Integrity
B) Availability
C) Authentication
D) Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
76
____ leaders reserve all decision-making responsibilities for themselves.

A) Autocratic
B) Democratic
C) Laissez-faire
D) Diplomatic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
77
The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of the ____ process.

A) accountability
B) authorization
C) identification
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
78
The ____ of information refers to the ability to access information without interference or obstruction and in a useable format.

A) privacy
B) confidentiality
C) integrity
D) availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
79
____ is the quality or state of being whole,complete,and uncorrupted.

A) Integrity
B) Authorization
C) Security
D) Confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
80
An information system possesses the characteristic of ____ when it is able to recognize individual users.

A) authentication
B) identification
C) authorization
D) accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 139 في هذه المجموعة.