100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank for Principles of Information Security, 7th Edition by Michael E. Whitman, All chapters |Newest update

Rating
5.0
(1)
Sold
3
Pages
402
Grade
A+
Uploaded on
13-09-2025
Written in
2025/2026

Test Bank for Principles of Information Security, 7th Edition by Michael E. Whitman, All chapters |Newest update

Institution
Information Security, 7th Edition
Course
Information Security, 7th Edition














Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Information Security, 7th Edition
Course
Information Security, 7th Edition

Document information

Uploaded on
September 13, 2025
Number of pages
402
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

@
Name: Class: Date:




Te
st
Full Test Bank for Principles of Information Security, 7th




ba
Edition Module 1-12




nk
Module 1 Introduction to Information Security




m
True / False




af
1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
N




ia
the products of the systems, and sabotage.
a. True
b. False
U
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
R
REFERENCES: H1: Introduction to Information Security
p. 2
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/2/2017 3:48 PM
D
2. Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
a. True
O
b. False
ANSWER: False
POINTS: 1
C
REFERENCES: H1: What is Security?
p. 8
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 1:54 PM

3. When a computer is the subject of an attack, it is the entity being attacked.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 1


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 10




st
H1: What is Security?
H2: Key Information Security Concepts




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
4. The value of information comes from the characteristics it possesses.
a. True
b. False
U
ANSWER: True
POINTS: 1
REFERENCES: p. 11
R
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
D
5. E-mail spoofing involves sending an e-mail message with a harmful attachment.
a. True
b. False
O
ANSWER: False
POINTS: 1
REFERENCES: p. 13
C
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 2:02 PM

6. The possession of information is the quality or state of having value for some purpose or end.
a. True
b. False
ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 2


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 13




st
H1: What is Security?
H2: Critical Characteristics of Information




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
7. A breach of possession may not always result in a breach of confidentiality.
a. True
b. False
U
ANSWER: True
POINTS: 1
REFERENCES: p. 14
R
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM
D
8. Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
a. True
b. False
O
ANSWER: False
POINTS: 1
REFERENCES: p. 16
C
H1: Components of An Information System
H2: Data
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM

9. Information security can be an absolute.
a. True
b. False
ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 3


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 17




st
H1: Security and The Organization
H2: Balancing Information Security and Access




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
10. To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the
security level must allow reasonable access, yet protect against threats.
a. True
U
b. False
ANSWER: True
POINTS: 1
R
REFERENCES: p. 17
H1: Security and The Organization
H2: Balancing Information Security and Access
SE
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 5:20 PM
D
11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
a. True
O
b. False
ANSWER: False
POINTS: 1
C
REFERENCES: p. 18
H1: Security and The Organization
H2: Approaches to Information Security Implementation
QUESTION TYPE:
S
True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

12. Using a methodology will usually have no effect on the probability of success.
a. True
b. False

Copyright Cengage Learning. Powered by Cognero. Page 4


Testbankmafia

, @
Name: Class: Date:




Te
ANSWER: False
POINTS: 1




st
REFERENCES: H1: Security and The Organization
H2: Approaches to Information Security Implementation




ba
p. 18
QUESTION TYPE: True / False




nk
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information




m
security
DATE CREATED: 9/14/2016 10:29 AM




af
N
DATE MODIFIED: 12/4/2016 2:12 PM




ia
13. A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in
project management and information security technical requirements.
U
a. True
b. False
ANSWER: False
R
POINTS: 1
REFERENCES: H1: Security and The Organization
H2: Security Professionals
SE
p. 20
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
profession of dentistry.
DATE CREATED: 9/14/2016 10:29 AM
D
DATE MODIFIED: 9/14/2016 10:29 AM

14. A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of
O
the information.
a. True
b. False
C
ANSWER: True
POINTS: 1
REFERENCES: p. 20
S
H1: Security and The Organization
H2: Data Responsibilities
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
profession of dentistry.
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

15. The roles of information security professionals focus on protecting the organization’s information systems and stored
information from attacks.
Copyright Cengage Learning. Powered by Cognero. Page 5


Testbankmafia

, @
Name: Class: Date:




Te
a. True
b. False




st
ANSWER: True
POINTS: 1




ba
REFERENCES: p. 20
H1: Security and The Organization




nk
H2: Communities of Interest
QUESTION TYPE: True / False




m
HAS VARIABLES: False




af
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
N
profession of dentistry.




ia
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/8/2021 10:44 AM
U
Modified True / False

16. Every organization, whether public or private and regardless of size, has information it wants to protect. ______
R
ANSWER: True
POINTS: 1
REFERENCES: H1: Introduction to Information Security
SE
p. 2
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.1 - Define information security
D
DATE CREATED: 4/6/2021 8:48 AM
DATE MODIFIED: 4/8/2021 10:46 AM

17. The history of information security begins with the concept of communications security. ______
O
ANSWER: False - computer
POINTS: 1
REFERENCES: H1: Introduction to Information Security
C
p. 3
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
S
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 4/6/2021 8:50 AM
DATE MODIFIED: 4/8/2021 10:46 AM

18. RAND Report R-609 was the first widely recognized published document to identify the role of management and
policy issues in computer security. ______
ANSWER: True
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 6


Testbankmafia

, @
Name: Class: Date:




Te
REFERENCES: p. 5
H1: Introduction to Information Security
H2: The 1970s and ’80s




st
QUESTION TYPE: Modified True / False




ba
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security




m
DATE CREATED: 4/6/2021 8:53 AM
DATE MODIFIED: 4/8/2021 10:46 AM




af
N




ia
19. Much of the early research on computer security centered on a system called Management Information and
Computing Service (MULTICS). _______
ANSWER: False - Multiplexed
U
POINTS: 1
REFERENCES: p. 6
H1: Introduction to Information Security
R
H2: The 1970s and ’80s
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
SE
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/8/2021 10:46 AM
D
20. According to the CNSS, networking is ―the protection of information and its critical elements.‖ _______
ANSWER: False - information security
POINTS: 1
O
REFERENCES: p. 8
H1: What is Security?
QUESTION TYPE: Modified True / False
C
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.1 - Define information security
S
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/7/2021 6:36 PM

21. Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control
of a threat. _______
ANSWER: True
POINTS: 1
REFERENCES: p. 9
H1: What is Security?
H2: Key Information Security Concepts
QUESTION TYPE: Modified True / False
Copyright Cengage Learning. Powered by Cognero. Page 7


Testbankmafia

Reviews from verified buyers

Showing all reviews
2 months ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Testbanksmafia Michigan State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
161
Member since
1 year
Number of followers
12
Documents
445
Last sold
2 days ago
Test Banks, Solution Manuals, Case studies, Summaries, Essays, and Exclusive Package Deals, All Graded A+.

Welcome to my store! In need to elevate your academic grades? search no more. Here you'll find thousands of comprehensive 5-star rated resources designed to empower you on your academic journey. I'm dedicated to provide you with top-quality, accurate , reliable , verified and latest updated documents with 100% pass guarantee. Your success is our priority, Let's achieve those top grades together !!!

4.6

14 reviews

5
11
4
2
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions