Information Security Final Exam Study Guide
Questions with 100% Correct Answers | Verified |
Updated (Actual Exam)
Save
Terms in this set (50)
During the early years of True
computing, the primary threats to
security were physical theft of
equipment, espionage against the
products of the systems, and
sabotage.
Network security focuses on the False
protection of the details of a
particular operation or series of
activities.
The value of information comes True
from the characteristics it
possesses.
When a computer is the subject of False
an attack, it is the entity being
attacked.
An e-mail virus involves sending an False
e-mail message with a modified
field.
, The possession of information is the False
quality or state of having value for
some purpose or end.
A breach of possession always False
results in a breach of confidentiality.
Hardware is often the most False
valuable asset possessed by an
organization and it is the main
target of intentional attacks.
Information security can be an False
absolute.
To achieve balance — that is, to True
operate an information system that
satisfies the user and the security
professional — the security level
must allow reasonable access, yet
protect against threats.
The bottom-up approach to False
information security has a higher
probability of success than the top-
down approach.
Using a methodology increases the True
probability of success.
The implementation phase is the False
longest and most expensive phase
of the systems development life
cycle (SDLC).
Questions with 100% Correct Answers | Verified |
Updated (Actual Exam)
Save
Terms in this set (50)
During the early years of True
computing, the primary threats to
security were physical theft of
equipment, espionage against the
products of the systems, and
sabotage.
Network security focuses on the False
protection of the details of a
particular operation or series of
activities.
The value of information comes True
from the characteristics it
possesses.
When a computer is the subject of False
an attack, it is the entity being
attacked.
An e-mail virus involves sending an False
e-mail message with a modified
field.
, The possession of information is the False
quality or state of having value for
some purpose or end.
A breach of possession always False
results in a breach of confidentiality.
Hardware is often the most False
valuable asset possessed by an
organization and it is the main
target of intentional attacks.
Information security can be an False
absolute.
To achieve balance — that is, to True
operate an information system that
satisfies the user and the security
professional — the security level
must allow reasonable access, yet
protect against threats.
The bottom-up approach to False
information security has a higher
probability of success than the top-
down approach.
Using a methodology increases the True
probability of success.
The implementation phase is the False
longest and most expensive phase
of the systems development life
cycle (SDLC).