100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS4361 Chapter 1Q&A

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
08-04-2025
Written in
2024/2025

CIS4361 Chapter 1Q&A

Institution
CIS4361
Course
CIS4361









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIS4361
Course
CIS4361

Document information

Uploaded on
April 8, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CIS4361 Chapter 1Q&A
A breach of possession always results in a breach of confidentiality. - =False



During the early years, information security was a straightforward process composed predominantly of
____________________ security and simple document classification schemes. - =Physical



Which of the following is a valid type of data ownership? - =Data Users, Data Owners and Data
Custodians



____ is the predecessor to the Internet. - =Arpanet



A(n) ____ attack is a hacker using a personal computer to break into a system. - =Direct



In an organization, the value of ____________________ of information is especially high when it
involves personal information about employees, customers, or patients. - =Confidentiality



The ____ model consists of six general phases. - =Waterfall



Key end users should be assigned to a developmental team, known as the united application
development team. - =False



A(n) _________________________ is a group of individuals who are united by similar interests or values
within an organization and who share a common goal of helping the organization to meet its objectives.
- =Community of Interest



The primary threats to security during the early years of computers were physical theft of equipment,
espionage against the products of the systems, and sabotage. - =True



A data custodian works directly with data owners and is responsible for the storage, maintenance, and
protection of the information. - =True

, The physical design is the blueprint for the desired solution. - =False



The ____________________ of information is the quality or state of ownership or control of some
object or item. - =Possession



The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-
connected local area ____________________. - =Network



The history of information security begins with the history of ____________________ security. -
=Computer



MULTICS stands for Multiple Information and Computing Service. - =False



During the ____________________ War, many mainframes were brought online to accomplish more
complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a
less cumbersome process than mailing magnetic tapes between computer centers. - =Cold



Recently, many states have implemented legislation making certain computer-related activities illegal. -
=True



Information security can begin as a grassroots effort in which systems administrators attempt to
improve the security of their systems, which is often referred to as a bottom-up approach. - =True



A famous study entitled "Protection Analysis: Final Report" was published in ____. - =1978



Risk evaluation is the process of identifying, assessing, and evaluating the levels of risk facing the
organization, specifically the threats to the organization's security and to the information stored and
processed by the organization. - =False



The implementation phase is the longest and most expensive phase of the systems development life
cycle (SDLC). - =False
$11.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
hurryben
3.0
(1)

Get to know the seller

Seller avatar
hurryben Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
1 year
Number of followers
5
Documents
1808
Last sold
8 months ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions