Threats are attacks carried out. - Answers False
Computer security is protection of the integrity, availability, and confidentiality of information system
resources. - Answers True
Data integrity assures that information and programs are changed only in a specified and authorized
manner. - Answers True
Availability assures that systems works promptly and service is not denied to authorized users. -
Answers True
The "A" in the CIA triad stands for "authenticity". - Answers False
The more critical a component or service, the higher the level of availability required. - Answers True
Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the
administrator who tries to close them. - Answers True
Security mechanisms typically do not involve more than one particular algorithm or protocol. -
Answers False
Many security administrators view strong security as an impediment to efficient and user-friendly
operation of an information system. - Answers True
In the context of security our concern is with the vulnerabilities of system resources. - Answers True
Hardware is the most vulnerable to attack and the least susceptible to automated controls. - Answers
True
Contingency planning is a functional area that primarily requires computer security technical
measures. - Answers False
X.800 architecture was developed as an international standard and focuses on security in the context
of networks and communications. - Answers True
The first step in devising security services and mechanisms is to develop a security policy. - Answers
True
Assurance is the process of examining a computer product or system with respect to certain criteria. -
Answers False
__________ assures that individuals control or influence what information related to them may be
collected and stored and by whom and to whom that information may be disclosed. - Answers Privacy
________ assures that a system performs its intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation of the system. - Answers System Integrity
A loss of _________ is the unauthorized disclosure of information. - Answers Confidentiality
A ________ level breach of security could be expected to have a severe or catastrophic adverse effect
on organizational operations, organizational assets, or individuals. - Answers high
A flaw or weakness in a system's design, implementation, or operation and management that could
be exploited to violate the system's security policy is a(n) __________. - Answers vulnerability
An assault on system security that derives from an intelligent act that is a deliberate attempt to evade
security services and violate the security policy of a system is a(n) __________. - Answers attack
A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability,
or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and
reporting it so that correct action can be taken. - Answers countermeasure
A(n) _________ is an attempt to learn or make use of information from the system that does not
affect system resources. - Answers passive attack
Masquerade, falsification, and repudiation are threat actions that cause __________ threat
consequences. - Answers deception
A threat action in which sensitive data are directly released to an unauthorized entity is __________. -
Answers exposure
An example of __________ is an attempt by an unauthorized user to gain access to a system by
posing as an authorized user. - Answers masquerade
The _________ prevents or inhibits the normal use or management of communications facilities. -
Answers denial of service
A __________ is any action that compromises the security of information owned by an organization. -
Answers security attack
The assurance that data received are exactly as sent by an authorized entity is __________. - Answers
data integrity