Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Security Operations and Management
Quiz 6: Information, Communications, and Computer Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
________ pose(s) security risks and challenges for individuals as well as organizations.
Question 22
True/False
Digitized information is not distance- or time-dependent.
Question 23
True/False
According to some experts, theft of money and securities of government represent the greatest threat to governments and businesses today.
Question 24
True/False
Information's worth can only be determined by calculating the political and financial impact of its loss.
Question 25
True/False
With discretionary information access control, access is allowed on a need-to-know basis.
Question 26
True/False
Mandatory access control strategies trace their origins to restrictive legislation.
Question 27
True/False
INFOSEC views operations from an adversary's perspective in an effort to seek out an organization's vulnerabilities and protect its critical information.
Question 28
True/False
Unlike business information, all government information must be released upon request.
Question 29
True/False
Converting plain text to crypto text is referred to as decryption.
Question 30
True/False
Acoustical emanations are produced through the interplay of electrical and mechanical parts contained in communications equipment.
Question 31
True/False
Cryptographic security should not be viewed as a substitute for physical, personnel, and information security.
Question 32
True/False
Interception of emanations can be prevented if computer rooms are constructed with acoustical materials and non-radiating electronic equipment is used.
Question 33
True/False
Computer crime is generally defined as any crime committed with computer technology.
Question 34
True/False
Anti-virus software is used to screen electronic traffic before allowing access to computer networks.
Question 35
True/False
According to John Carroll's "simple security principle" for safeguarding sensitive computer information, no person should view information that has a classification that exceeds the viewer's security clearance.