Information Assurance and Security

Is this your test? Login to manage it. If not, you can create an exam just like it.

This is a non-interactive preview of the quiz content.

1.
2 points
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
2.
2 points
The Implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
3.
2 points
Network security focuses on the protection of the details of a particular operation or series of activities.
4.
2 points
Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
5.
2 points
The most successful kind of top-down approach involves a formal development strategy referred to as a(n) ____.
6.
2 points
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a(n) ____ value.
7.
2 points
Part of the Logical Design phase of the SecSDLC is planning for partial or catastrophic loss. ____ dictates what steps are taken when an attack occurs.
8.
2 points
____ is the origin of today’s Internet.
9.
2 points
Individuals with the primary responsibility for administering the systems that house the information used by the organization perform the ____ role.
10.
2 points
A famous study entitled “Protection Analysis: Final Report” was published in ____.
11.
2 points
Which of the following phases is the longest and most expensive phase of the systems development life cycle?
12.
2 points
The bottom-up approach to information security has a higher probability of success than the top-down approach.
13.
2 points
Organizations are moving toward more ____-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but the confidence of the consumer in their product.
14.
2 points
The value of information comes from the characteristics it possesses.
15.
2 points
A methodology increases the probability of success.
16.
2 points
A(n) ____ attack is when a hacker uses his or her personal computer to break into a system.
17.
2 points
A computer is the ____ of an attack when it is used to conduct the attack.
18.
2 points
____ was the first and only operating system created with security as its primary goal.
19.
2 points
The SDLC process may be initiated in response to specific conditions or combinations of conditions.
20.
2 points
A champion is a project manager, who may be a departmental line manager or staff unit manager, who understands project management, personnel management, and information security technical requirements.
21.
2 points
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
22.
2 points
Which of the following is a valid type of data ownership?
23.
2 points
In the ____ phase of the systems development life cycle, solutions are evaluated, selected, and acquired through a make-or-buy process.
24.
2 points
The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.
25.
2 points
____ of information is the quality or state of being genuine or original.