Deck 1: Introduction to Information Security

Full screen (f)
exit full mode
Question
Network security focuses on the protection of the details of a particular operation or series of activities.
Use Space or
up arrow
down arrow
to flip the card.
Question
Using a methodology increases the probability of success.
Question
The physical design is the blueprint for the desired solution.
Question
To achieve balance - that is,to operate an information system that satisfies the user and the security professional - the security level must allow reasonable access,yet protect against threats.
Question
The investigation phase of the SecSDLC begins with a directive from upper management.
Question
Recently,many states have implemented legislation making certain computer-related activities illegal.
Question
Information security can be an absolute.
Question
The value of information comes from the characteristics it possesses.
Question
The possession of information is the quality or state of having value for some purpose or end.
Question
Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
Question
A champion is a project manager,who may be a departmental line manager or staff unit manager,and understands project management,personnel management,and information security technical requirements.
Question
When a computer is the subject of an attack,it is the entity being attacked.
Question
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
Question
A data custodian works directly with data owners and is responsible for the storage,maintenance,and protection of the information.
Question
The bottom-up approach to information security has a higher probability of success than the top-down approach.
Question
Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.
Question
An e-mail virus involves sending an e-mail message with a modified field.
Question
The roles of information security professionals are aligned with the goals and mission of the information security community of interest.
Question
The primary threats to security during the early years of computers were physical theft of equipment,espionage against the products of the systems,and sabotage.
Question
A breach of possession always results in a breach of confidentiality.
Question
____ is the predecessor to the Internet.

A)NIST
B)ARPANET
C)FIPS
D)DES
Question
The Security Development Life Cycle (SDLC)is a methodology for the design and implementation of an information system._________________________
Question
A(n)____ attack is a hacker using a personal computer to break into a system.

A)indirect
B)direct
C)software
D)hardware
Question
A famous study entitled "Protection Analysis: Final Report" was published in ____.

A)1868
B)1978
C)1988
D)1998
Question
Hardware is the physical technology that houses and executes the software,stores and transports the data,and provides interfaces for the entry and removal of information from the system._________________________
Question
____ was the first operating system to integrate security as its core functions.

A)UNIX
B)DOS
C)MULTICS
D)ARPANET
Question
Of the two approaches to information security implementation,the top-down approach has a higher probability of success._________________________
Question
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects._________________________
Question
Confidentiality ensures that only those with the rights and privileges to access information are able to do so._________________________
Question
Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat._________________________
Question
MULTICS stands for Multiple Information and Computing Service._________________________
Question
____ security addresses the issues necessary to protect the tangible items,objects,or areas of an organization from unauthorized access and misuse.

A)Physical
B)Personal
C)Object
D)Standard
Question
In information security,salami theft occurs when an employee steals a few pieces of information at a time,knowing that taking more would be noticed - but eventually the employee gets something complete or useable._________________________
Question
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems,which is often referred to as a bottom-up approach._________________________
Question
In general,protection is "the quality or state of being secure-to be free from danger." _________________________
Question
The Analysis phase of the SecSDLC begins with a directive from upper management._________________________
Question
Key end users should be assigned to a developmental team,known as the united application development team._________________________
Question
Risk evaluation is the process of identifying,assessing,and evaluating the levels of risk facing the organization,specifically the threats to the organization's security and to the information stored and processed by the organization._________________________
Question
A(n)project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas._________________________
Question
Policies are written instructions for accomplishing a specific task._________________________
Question
In file hashing,a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.

A)key
B)hashing
C)hash
D)code
Question
The ____ is the individual primarily responsible for the assessment,management,and implementation of information security in the organization.

A)ISO
B)CIO
C)CISO
D)CTO
Question
The ____ is a methodology for the design and implementation of an information system in an organization.

A)DSLC
B)SDLC
C)LCSD
D)CLSD
Question
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ____________________.
Question
During the early years,information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
Question
A computer is the ____ of an attack when it is used to conduct the attack.

A)subject
B)object
C)target
D)facilitator
Question
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triangle.
Question
Which of the following phases is the longest and most expensive phase of the systems development life cycle?

A)investigation
B)logical design
C)implementation
D)maintenance and change
Question
Organizations are moving toward more ____-focused development approaches,seeking to improve not only the functionality of the systems they have in place,but consumer confidence in their product.

A)security
B)reliability
C)accessibility
D)availability
Question
An information system is the entire set of ____,people,procedures,and networks that make possible the use of information resources in the organization.

A)software
B)hardware
C)data
D)All of the above
Question
____ of information is the quality or state of being genuine or original.

A)Authenticity
B)Spoofing
C)Confidentiality
D)Authorization
Question
The history of information security begins with the history of ____________________ security.
Question
People with the primary responsibility for administering the systems that house the information used by the organization perform the ____ role.

A)security policy developers
B)security professionals
C)system administrators
D)end users
Question
During the ____________________ War,many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
Question
The ____ model consists of six general phases.

A)pitfall
B)5SA&D
C)waterfall
D)SysSP
Question
During the ____ phase,specific technologies are selected to support the alternatives identified and evaluated in the logical design.

A)investigation
B)implementation
C)analysis
D)physical design
Question
____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.

A)NIST SP 800-12
B)NSTISSI No.4011
C)IEEE 802.11(g)
D)ISO 17788
Question
The most successful kind of top-down approach involves a formal development strategy referred to as a ____.

A)systems design
B)development life project
C)systems development life cycle
D)systems schema
Question
Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss.____ dictates what steps are taken when an attack occurs.

A)Continuity planning
B)Incident response
C)Disaster recovery
D)Security response
Question
Which of the following is a valid type of data ownership?

A)Data owners
B)Data custodians
C)Data users
D)All of the above
Question
In the ____________________ approach,the project is initiated by upper-level managers who issue policy,procedures and processes,dictate the goals and expected outcomes,and determine accountability for each required action.
Question
Information has ____________________ when it is whole,complete,and uncorrupted.
Question
In an organization,the value of ____________________ of information is especially high when it involves personal information about employees,customers,or patients.
Question
A(n)____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.
Question
____________________ enables authorized users - persons or computer systems - to access information without interference or obstruction and to receive it in the required format.
Question
A frequently overlooked component of an IS,____________________ are written instructions for accomplishing a specific task.
Question
The senior technology officer is typically the chief ____________________ officer.
Question
List and describe the six phases of the security systems development life cycle.
Question
Describe the multiple types of security systems present in many organizations.
Question
____________________ carries the lifeblood of information through an organization.
Question
The ____________________ component of the IS comprises applications,operating systems,and assorted command utilities.
Question
Outline types of data ownership and their respective responsibilities.
Question
A(n)____________________ information security policy outlines the implementation of a security program within the organization.
Question
The ____________________ of information is the quality or state of ownership or control of some object or item.
Question
A(n)_________________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.
Question
A computer is the ____________________ of an attack when it is the target entity.
Question
The ____________________ phase consists primarily of assessments of the organization,its current systems,and its capability to support the proposed systems.
Question
____________________ of information is the quality or state of being genuine or original,rather than a reproduction or fabrication.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to Information Security
1
Network security focuses on the protection of the details of a particular operation or series of activities.
False
2
Using a methodology increases the probability of success.
True
3
The physical design is the blueprint for the desired solution.
False
4
To achieve balance - that is,to operate an information system that satisfies the user and the security professional - the security level must allow reasonable access,yet protect against threats.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
5
The investigation phase of the SecSDLC begins with a directive from upper management.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
6
Recently,many states have implemented legislation making certain computer-related activities illegal.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
7
Information security can be an absolute.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
8
The value of information comes from the characteristics it possesses.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
9
The possession of information is the quality or state of having value for some purpose or end.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
10
Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
11
A champion is a project manager,who may be a departmental line manager or staff unit manager,and understands project management,personnel management,and information security technical requirements.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
12
When a computer is the subject of an attack,it is the entity being attacked.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
13
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
14
A data custodian works directly with data owners and is responsible for the storage,maintenance,and protection of the information.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
15
The bottom-up approach to information security has a higher probability of success than the top-down approach.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
16
Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
17
An e-mail virus involves sending an e-mail message with a modified field.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
18
The roles of information security professionals are aligned with the goals and mission of the information security community of interest.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
19
The primary threats to security during the early years of computers were physical theft of equipment,espionage against the products of the systems,and sabotage.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
20
A breach of possession always results in a breach of confidentiality.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
21
____ is the predecessor to the Internet.

A)NIST
B)ARPANET
C)FIPS
D)DES
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
22
The Security Development Life Cycle (SDLC)is a methodology for the design and implementation of an information system._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
23
A(n)____ attack is a hacker using a personal computer to break into a system.

A)indirect
B)direct
C)software
D)hardware
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
24
A famous study entitled "Protection Analysis: Final Report" was published in ____.

A)1868
B)1978
C)1988
D)1998
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
25
Hardware is the physical technology that houses and executes the software,stores and transports the data,and provides interfaces for the entry and removal of information from the system._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
26
____ was the first operating system to integrate security as its core functions.

A)UNIX
B)DOS
C)MULTICS
D)ARPANET
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
27
Of the two approaches to information security implementation,the top-down approach has a higher probability of success._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
28
Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
29
Confidentiality ensures that only those with the rights and privileges to access information are able to do so._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
30
Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
31
MULTICS stands for Multiple Information and Computing Service._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
32
____ security addresses the issues necessary to protect the tangible items,objects,or areas of an organization from unauthorized access and misuse.

A)Physical
B)Personal
C)Object
D)Standard
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
33
In information security,salami theft occurs when an employee steals a few pieces of information at a time,knowing that taking more would be noticed - but eventually the employee gets something complete or useable._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
34
Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems,which is often referred to as a bottom-up approach._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
35
In general,protection is "the quality or state of being secure-to be free from danger." _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
36
The Analysis phase of the SecSDLC begins with a directive from upper management._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
37
Key end users should be assigned to a developmental team,known as the united application development team._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
38
Risk evaluation is the process of identifying,assessing,and evaluating the levels of risk facing the organization,specifically the threats to the organization's security and to the information stored and processed by the organization._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
39
A(n)project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
40
Policies are written instructions for accomplishing a specific task._________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
41
In file hashing,a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.

A)key
B)hashing
C)hash
D)code
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
42
The ____ is the individual primarily responsible for the assessment,management,and implementation of information security in the organization.

A)ISO
B)CIO
C)CISO
D)CTO
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
43
The ____ is a methodology for the design and implementation of an information system in an organization.

A)DSLC
B)SDLC
C)LCSD
D)CLSD
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
44
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
45
During the early years,information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
46
A computer is the ____ of an attack when it is used to conduct the attack.

A)subject
B)object
C)target
D)facilitator
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
47
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triangle.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following phases is the longest and most expensive phase of the systems development life cycle?

A)investigation
B)logical design
C)implementation
D)maintenance and change
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
49
Organizations are moving toward more ____-focused development approaches,seeking to improve not only the functionality of the systems they have in place,but consumer confidence in their product.

A)security
B)reliability
C)accessibility
D)availability
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
50
An information system is the entire set of ____,people,procedures,and networks that make possible the use of information resources in the organization.

A)software
B)hardware
C)data
D)All of the above
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
51
____ of information is the quality or state of being genuine or original.

A)Authenticity
B)Spoofing
C)Confidentiality
D)Authorization
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
52
The history of information security begins with the history of ____________________ security.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
53
People with the primary responsibility for administering the systems that house the information used by the organization perform the ____ role.

A)security policy developers
B)security professionals
C)system administrators
D)end users
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
54
During the ____________________ War,many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
55
The ____ model consists of six general phases.

A)pitfall
B)5SA&D
C)waterfall
D)SysSP
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
56
During the ____ phase,specific technologies are selected to support the alternatives identified and evaluated in the logical design.

A)investigation
B)implementation
C)analysis
D)physical design
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
57
____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.

A)NIST SP 800-12
B)NSTISSI No.4011
C)IEEE 802.11(g)
D)ISO 17788
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
58
The most successful kind of top-down approach involves a formal development strategy referred to as a ____.

A)systems design
B)development life project
C)systems development life cycle
D)systems schema
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
59
Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss.____ dictates what steps are taken when an attack occurs.

A)Continuity planning
B)Incident response
C)Disaster recovery
D)Security response
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is a valid type of data ownership?

A)Data owners
B)Data custodians
C)Data users
D)All of the above
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
61
In the ____________________ approach,the project is initiated by upper-level managers who issue policy,procedures and processes,dictate the goals and expected outcomes,and determine accountability for each required action.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
62
Information has ____________________ when it is whole,complete,and uncorrupted.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
63
In an organization,the value of ____________________ of information is especially high when it involves personal information about employees,customers,or patients.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
64
A(n)____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
65
____________________ enables authorized users - persons or computer systems - to access information without interference or obstruction and to receive it in the required format.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
66
A frequently overlooked component of an IS,____________________ are written instructions for accomplishing a specific task.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
67
The senior technology officer is typically the chief ____________________ officer.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
68
List and describe the six phases of the security systems development life cycle.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
69
Describe the multiple types of security systems present in many organizations.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
70
____________________ carries the lifeblood of information through an organization.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
71
The ____________________ component of the IS comprises applications,operating systems,and assorted command utilities.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
72
Outline types of data ownership and their respective responsibilities.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
73
A(n)____________________ information security policy outlines the implementation of a security program within the organization.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
74
The ____________________ of information is the quality or state of ownership or control of some object or item.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
75
A(n)_________________________ is a group of individuals who are united by similar interests or values within an organization and who share a common goal of helping the organization to meet its objectives.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
76
A computer is the ____________________ of an attack when it is the target entity.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
77
The ____________________ phase consists primarily of assessments of the organization,its current systems,and its capability to support the proposed systems.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
78
____________________ of information is the quality or state of being genuine or original,rather than a reproduction or fabrication.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 78 flashcards in this deck.