SRA111 PreQuiz1

Card Set Information

Author:
guntoro
ID:
251823
Filename:
SRA111 PreQuiz1
Updated:
2013-12-08 21:08:50
Tags:
SRA111 PreQuiz1
Folders:

Description:
SRA111 PreQuiz1
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user guntoro on FreezingBlue Flashcards. What would you like to do?


  1. 1.Policies are written instructions for accomplishing a specific task. (T/F)
    False - Procedures
  2. 2.In general, protection is “the quality or state of being secure—to be free from danger.” (T/F)
    False - Security is
  3. 3.The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC). (T/F)
    False
  4. 4.The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage. (T/F)
    True
  5. 5.A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. (T/F)
    True
  6. 6.Confidentiality ensures that only those with the rights and privileges to access information are able to do so. (T/F)
    True
  7. 7.A famous study entitled “Protection Analysis: Final Report” was published in ____.
    A) 1978
    B) 1998
    C) 1988
    D) 1868
    A) 1978
    (this multiple choice question has been scrambled)
  8. 8.The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.
    A) ISO
    B) CISO
    C) CTO
    D) CIO
    B) CISO
    (this multiple choice question has been scrambled)
  9. 9.____ is the predecessor to the Internet.
    A) DES
    B) FIPS
    C) ARPANET
    D) NIST
    C) ARPANET
    (this multiple choice question has been scrambled)
  10. 10.A(n) ____________ is a formal approach to solving a problem by means of a structured sequence of procedures.
    methodology
  11. 11.____ of information is the quality or state of being genuine or original.
    A) Spoofing
    B) Confidentiality
    C) Authorization
    D) Authenticity
    D) Authenticity
    (this multiple choice question has been scrambled)
  12. 12.An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization.
    A) data
    B) hardware
    C) all of the above
    D) software
    C) all of the above
  13. 13.Of the two approaches to information security implementation, the top-down approach has a higher probability of success. (T/F)
    True
  14. 14.____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
    A) Standard
    B) Object
    C) Personal
    D) Physical
    D) Physical
    (this multiple choice question has been scrambled)
  15. 15.____________enables authorized users — persons or computer systems — to access information without interference or obstruction and to receive it in the required format.
    Availability
  16. 16.The Security Development Life Cycle (SDLC) is a methodology for the design and implementation of an information system (T/F)
    False - System Development Life Cycle (SDLC)
  17. 17.During the ____ phase, specific technologies are selected to support the alternatives identified and evaluated in the logical design.
    A) investigation
    B) physical design
    C) implementation
    D) analysis
    B) physical design
    (this multiple choice question has been scrambled)
  18. 18.Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, which is often referred to as a bottom-up approach. (T/F)
    True
  19. 19.The bottom-up approach to information security has a higher probability of success than the top-down approach. (T/F)
    False
  20. 20.In information security, salami theft occurs when an employee steals a few pieces of information at a time, knowing that taking more would be noticed — but eventually the employee gets something complete or useable. (T/F)
    True
  21. 21.A breach of possession always results in a breach of confidentiality. (T/F)
    False
  22. 22.The CNSS model of information security evolved from a concept developed by the computer security industry known as the _______________ triangle.
    CIA
  23. 23. _________________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.
    Authenticity
  24. 24.The value of information comes from the characteristics it possesses. (T/F)
    True
  25. 25.The ________________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
    analysis

What would you like to do?

Home > Flashcards > Print Preview