Filters
Question type

A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.


A) pitfall
B) SA&D
C) waterfall
D) Method 7

Correct Answer

verifed

verified

The investigation phase of the SDLC involves specification of the objectives, constraints, and scope of the project.

Correct Answer

verifed

verified

To achieve balance-that is, to operate an information system that satisfies the user and the security professional-the security level must allow reasonable access, yet protect against threats.

Correct Answer

verifed

verified

The ____________________ component of an information system comprises applications, operating systems, and assorted command utilities.

Correct Answer

verifed

verified

__________ was the first operating system to integrate security as one of its core functions.


A) UNIX
B) DOS
C) MULTICS
D) ARPANET

Correct Answer

verifed

verified

C

Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects. _________________________

Correct Answer

verifed

verified

False - accuracy

A frequently overlooked component of an information system, ____________________ are the written instructions for accomplishing a specific task.

Correct Answer

verifed

verified

A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of procedures.

Correct Answer

verifed

verified

The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.

Correct Answer

verifed

verified

A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.


A) access
B) assets
C) exploits
D) risk

Correct Answer

verifed

verified

Describe the multiple types of security systems present in many organizations.

Correct Answer

verifed

verified

A successful organization should have th...

View Answer

According to the CNSS, networking is "the protection of information and its critical elements." _________________________

Correct Answer

verifed

verified

False - information security

Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.

Correct Answer

verifed

verified

Key end users should be assigned to a developmental team, known as the united application development team. _________________________

Correct Answer

verifed

verified

The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-connected local area network.

Correct Answer

verifed

verified

A(n) hardware system is the entire set of people, procedures, and technology that enable business to use information. _________________________

Correct Answer

verifed

verified

During the ____________________ phase of the systems life cycle, the process begins by examining the event or plan that initiated the process. During this phase, the objectives, constraints, and scope of the project are specified.

Correct Answer

verifed

verified

A breach of possession may not always result in a breach of confidentiality.

Correct Answer

verifed

verified

When a computer is the subject of an attack, it is the entity being attacked.

Correct Answer

verifed

verified

A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in project management and information security technical requirements.

Correct Answer

verifed

verified

Showing 1 - 20 of 87

Related Exams

Show Answer