Filters
Question type

Study Flashcards

Using a methodology increases the probability of success.

Correct Answer

verifed

verified

In an organization,the value of ____________________ of information is especially high when it involves personal information about employees,customers,or patients.

Correct Answer

verifed

verified

Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects._________________________

Correct Answer

verifed

verified

Outline types of data ownership and their respective responsibilities.

Correct Answer

verifed

verified

Data owners: Those responsible for the s...

View Answer

List and describe the six phases of the security systems development life cycle.

Correct Answer

verifed

verified

Investigation
The investigation phase of...

View Answer

The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

Correct Answer

verifed

verified

Network security focuses on the protection of the details of a particular operation or series of activities.

Correct Answer

verifed

verified

During the ____________________ War,many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.

Correct Answer

verifed

verified

A computer is the ____ of an attack when it is used to conduct the attack.


A) subject
B) object
C) target
D) facilitator

Correct Answer

verifed

verified

During the early years,information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes.

Correct Answer

verifed

verified

Which of the following phases is the longest and most expensive phase of the systems development life cycle?


A) investigation
B) logical design
C) implementation
D) maintenance and change

Correct Answer

verifed

verified

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triangle.

Correct Answer

verifed

verified

CIA
C.I.A.
Confident...

View Answer

The history of information security begins with the history of ____________________ security.

Correct Answer

verifed

verified

Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.

Correct Answer

verifed

verified

____________________ carries the lifeblood of information through an organization.

Correct Answer

verifed

verified

An information system is the entire set of ____,people,procedures,and networks that make possible the use of information resources in the organization.


A) software
B) hardware
C) data
D) All of the above

Correct Answer

verifed

verified

Of the two approaches to information security implementation,the top-down approach has a higher probability of success._________________________

Correct Answer

verifed

verified

Hardware is the physical technology that houses and executes the software,stores and transports the data,and provides interfaces for the entry and removal of information from the system._________________________

Correct Answer

verifed

verified

Showing 61 - 78 of 78

Related Exams

Show Answer