Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 2
Quiz 1: Introduction to Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 1
True/False
The investigation phase of the SDLC involves specification of the objectives, constraints, and scope of the project.
Question 2
True/False
The physical design is the blueprint for the desired solution.
Question 3
True/False
Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
Question 4
True/False
When a computer is the subject of an attack, it is the entity being attacked.
Question 5
True/False
The possession of information is the quality or state of having value for some purpose or end.
Question 6
True/False
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.
Question 7
True/False
To achieve balance-that is, to operate an information system that satisfies the user and the security professional-the security level must allow reasonable access, yet protect against threats.
Question 8
True/False
The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.
Question 9
True/False
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
Question 10
True/False
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
Question 11
True/False
The bottom-up approach to information security has a higher probability of success than the top-down approach.
Question 12
True/False
E-mail spoofing involves sending an e-mail message with a harmful attachment.
Question 13
True/False
In the physical design phase, specific technologies are selected.
Question 14
True/False
The value of information comes from the characteristics it possesses.
Question 15
True/False
Using a methodology will usually have no effect on the probability of success.
Question 16
True/False
Information security can be an absolute.
Question 17
True/False
A breach of possession may not always result in a breach of confidentiality.
Question 18
True/False
During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage.
Question 19
True/False
The water-ski model is a type of SDLC in which each phase of the process flows from the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.