Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 1: Introduction to Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Short Answer
The ____________________ component of an information system comprises applications, operating systems, and assorted command utilities.
Question 62
Short Answer
The history of information security begins with the concept of ____________________ security.
Question 63
Short Answer
In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients.
Question 64
Short Answer
____________________ enables authorized users-people or computer systems-to access information without interference or obstruction and to receive it in the required format.
Question 65
Short Answer
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.
Question 66
Short Answer
A computer is the ____________________ of an attack when it is the entity being targeted.
Question 67
Short Answer
The senior technology officer is typically the chief ____________________ officer.
Question 68
Short Answer
Software is often created under the constraints of ____________________ management, placing limits on time, cost, and manpower.
Question 69
Short Answer
In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures, and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
Question 70
Short Answer
A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.
Question 71
Short Answer
The ____________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
Question 72
Multiple Choice
A technique used to compromise a system is known as a(n) ___________.
Question 73
Short Answer
A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.
Question 74
Short Answer
During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
Question 75
Short Answer
____________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
Question 76
Short Answer
The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.
Question 77
Short Answer
The ____________________ of information is the quality or state of ownership or control of some object or item.
Question 78
Short Answer
During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks, so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
Question 79
Short Answer
During the ____________________ phase of the systems life cycle, the process begins by examining theevent or plan that initiated the process. During this phase, the objectives, constraints, and scope of the project are specified.