1|Page
INFORMATION SECURITY FINAL EXAM WITH
CORRECT ACTUAL QUESTIONS AND CORRECTLY
WELL DEFINED ANSWERS LATEST 2025 ALREADY
GRADED A+
What are the three goals of security? - (answer)CIA: Confidentiality, Integrity,
Availability
What are the broad categories of threats? - (answer)Natural, Human (both
intentional and unintentional)
Describe the three categories of security choices. - (answer)Rule-based decisions:
Made for us by external circumstances or established, widely accepted guidelines.
Relativistic decisions: These try to "outdo" others who are faced with similar
security problems (hunter dilemma, outrun other hunter)
Rational decisions: Based on a systematic analysis of security situation
What are the six phases of the security process? - (answer)Identify your assets
Analyze the risk of attack
Establish your security policy
Implement your defenses
Monitor your defenses
Recover from attacks
, 2|Page
What is continuous improvement? - (answer)A four step cycle that never ends to
ensure security is constantly improving: Plan → Do → Check → Act (analyze
differences made)
Define asset. - (answer)Asset: Physical items, information, and services that we
wish to protect
Define risk. - (answer)Potential situations that threaten our assets useful to
determine the likelihood of each.
Define threat agents. - (answer)Who/what is the threat categorized by likely acts
and motivation
Define policy. - (answer)Describes the protection you need (goals) and identifies
boundaries.
Define implementation. - (answer)How will the policy be enforced?
Define monitoring. - (answer)How do you know if the policy is violated?
Define recovery. - (answer)Fix problems and improve/revise as needed.
What are the two types of assets? - (answer)Physical and Logical
INFORMATION SECURITY FINAL EXAM WITH
CORRECT ACTUAL QUESTIONS AND CORRECTLY
WELL DEFINED ANSWERS LATEST 2025 ALREADY
GRADED A+
What are the three goals of security? - (answer)CIA: Confidentiality, Integrity,
Availability
What are the broad categories of threats? - (answer)Natural, Human (both
intentional and unintentional)
Describe the three categories of security choices. - (answer)Rule-based decisions:
Made for us by external circumstances or established, widely accepted guidelines.
Relativistic decisions: These try to "outdo" others who are faced with similar
security problems (hunter dilemma, outrun other hunter)
Rational decisions: Based on a systematic analysis of security situation
What are the six phases of the security process? - (answer)Identify your assets
Analyze the risk of attack
Establish your security policy
Implement your defenses
Monitor your defenses
Recover from attacks
, 2|Page
What is continuous improvement? - (answer)A four step cycle that never ends to
ensure security is constantly improving: Plan → Do → Check → Act (analyze
differences made)
Define asset. - (answer)Asset: Physical items, information, and services that we
wish to protect
Define risk. - (answer)Potential situations that threaten our assets useful to
determine the likelihood of each.
Define threat agents. - (answer)Who/what is the threat categorized by likely acts
and motivation
Define policy. - (answer)Describes the protection you need (goals) and identifies
boundaries.
Define implementation. - (answer)How will the policy be enforced?
Define monitoring. - (answer)How do you know if the policy is violated?
Define recovery. - (answer)Fix problems and improve/revise as needed.
What are the two types of assets? - (answer)Physical and Logical