100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

Management of Information Security 6th Edition Michael Whitman, Herbert Mattord All Chapters 1-12 | TEST BANK

Rating
-
Sold
1
Pages
175
Uploaded on
01-01-2023
Written in
2022/2023

Test Bank for Management of Information Security 6th Edition Michael E. Whitman, Herbert J. Mattord, ISBN-10: X. All Chapters 1-12. 175 Pages. TABLE OF CONTENTS UNIT I: Foundations of Infor mation Security. 1. Introduction to Management of Information Security. 2. Compliance: Law and Ethics. UNIT II: Strategic Information Security Management. 3. Governance and Strategic Planning for Security. 4. Security Policy. 5. Developing the Security Program. 6. Risk Management: Identifying and Assessing Risk. 7. Risk Management: Controlling Risk. UNIT III: Operational Information Security Management. 8. Security Management Models. 9. Security Management Practices. 10. Planning for Contingencies. 11. Personnel and Security. 12. Protection Mechanisms. Appendix.

Show more Read less
Institution
Management Of Information Security
Course
Management of Information Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Management of Information Security
Course
Management of Information Security

Document information

Uploaded on
January 1, 2023
Number of pages
175
Written in
2022/2023
Type
Other
Person
Unknown

Subjects

Content preview

,CHAPTER 1

1. Corruption of information can occur only while information is being
stored.

a. True
*b. False


2. The authorization process takes place before the authentication
process.

a. True
*b. False


3. A worm may be able to deposit copies of itself onto all Web servers
that the infected system can reach, so that users who subsequently
visit those sites become infected.

*a. True
b. False


4. DoS attacks cannot be launched against routers.

a. True
*b. False


5. The first step in solving problems is to gather facts and make
assumptions.

a. True
*b. False


6. A device (or a software program on a computer) that can monitor data
traveling on a network is known as a socket sniffer. __________

a. True
*b. False


7. One form of e-mail attack that is also a DoS attack is called a mail
spoof, in which an attacker overwhelms the receiver with excessive
quantities of e-mail. __________

a. True
*b. False

,8. When voltage levels lag (experience a momentary increase), the extra
voltage can severely damage or destroy equipment. __________

a. True
*b. False


9. "Shoulder spying" is used in public or semi-public settings when
individuals gather information they are not authorized to have by
looking over another individual’s shoulder or viewing the information
from a distance. __________

a. True
*b. False


10. The term phreaker is now commonly associated with an individual who
cracks or removes software protection that is designed to prevent
unauthorized duplication. __________

a. True
*b. False


11. The application of computing and network resources to try every
possible combination of options of a password is called
a dictionary attack. __________

a. True
*b. False


12. The macro virus infects the key operating system files located in a
computer’s start-up sector. __________

a. True
*b. False


13. The malicious code attack includes the execution of viruses, worms,
Trojan horses, and active Web scripts with the intent to destroy or
steal information. __________

*a. True
b. False


14. A(n) polymorphic threat is one that over time changes the way it
appears to antivirus software programs, making it undetectable by
techniques that look for pre-configured signatures. __________

*a. True
b. False

, 15. Communications security involves the protection of which of the following?

a. radio handsets
b. people, physical assets
c. the IT department
*d. media, technology, and content


16. The protection of voice and data components, connections, and content is known as
__________ security.

*a. network
b. national
c. cyber
d. operational


17. The protection of confidentiality, integrity, and availability of data regardless of its
location is known as __________ security.

*a. information
b. network
c. cyber
d. operational


18. A model of InfoSec that offers a comprehensive view of security for data while being
stored, processed, or transmitted is the __________ security model.

*a. CNSS
b. USMC
c. USNA
d. NPC


19. Which of the following is a C.I.A. triad characteristic that addresses the threat from
corruption, damage, destruction, or other disruption of its authentic state?

*a. integrity
b. availability
c. authentication
d. accountability


20. According to the C.I.A. triad, which of the following is the most desirable characteristic for
privacy?

*a. confidentiality

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AcademiContent Aalborg University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3061
Member since
6 year
Number of followers
2132
Documents
1236
Last sold
14 hours ago

4.0

386 reviews

5
203
4
84
3
38
2
17
1
44

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions