You are on page 1of 4

Review Test Submission: Quiz 1 - Team

Content

User Hien Tran Course CIS 481-20: INTRO TO INFORM SECURITY-Summer 2012 Test Quiz 1 - Team Started 5/31/12 1:17 PM Submitted 5/31/12 1:21 PM Status Completed Score 25 out of 25 points Time Elapsed 3 minutes. Instructions Please answer each question carefully.
false

Question 1
1 out of 1 points

A breach of possession always results in a breach of confidentiality. Answer Selected Answer: Correct Answer: False False

Question 2
1 out of 1 points

Information security can be an absolute. Answer Selected Answer: Correct Answer: False False

Question 3
1 out of 1 points

To achieve balance that is, to operate an information system that satisfies the user and the security professional the security level must allow reasonable access, yet protect against threats. Answer Selected Answer: Correct Answer: True True

Question 4

1 out of 1 points

The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage. Answer Selected Answer: Correct Answer: True True

Question 5
1 out of 1 points

When a computer is the subject of an attack, it is the entity being attacked. Answer Selected Answer: Correct Answer: False False

Question 6
2 out of 2 points

____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse. Answer Selected Answer: Physical Correct Answer: Physical

Question 7
2 out of 2 points

____ of information is the quality or state of being genuine or original. Answer Selected Answer: Authenticity Correct Answer: Authenticity

Question 8
2 out of 2 points

An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization. Answer

Selected Answer: All of the above Correct Answer: All of the above

Question 9
2 out of 2 points

The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization. Answer Selected Answer: CISO Correct Answer: CISO

Question 10
2 out of 2 points

Information has __________ when it is free from mistakes or errors and has the value that the end user expects. Answer Selected Answer: Accuracy Correct Answer: Accuracy

Question 11
2 out of 2 points

Information has __________ when it is whole, complete, and uncorrupted. Answer Selected Answer: Integrity Correct Answer: Integrity

Question 12
2 out of 2 points

In a(n) __________ attack, a system is compromised and used to attack other systems.

Answer Selected Answer: Indirect Correct Answer: Indirect

Question 13
2 out of 2 points

A(n) __________ is an organizational resource that is being protected. Answer Selected Answer: Asset Correct Answer: Asset

Question 14
2 out of 2 points

A(n) __________ is a weakness or fault in a system or protection mechanism that opens it to attack or damage. Answer Selected Answer: Vulnerability Correct Answer: Vulnerability

Question 15
2 out of 2 points

During which phase of the security systems development life cycle (SecSDLC) would an in-depth examination of the current threats and controls take place? Answer Selected Answer: Analysis Correct Answer: Analysis
Friday, June 1, 2012 10:04:44 AM EDT

You might also like