Questions
Save
Terms in this set (200)
An information system is d.
the entire set of __________, All of the above
people, procedures, and
networks that make
possible the use of
information resources in
the organization.
Select one:
a.
data
b.
software
c.
hardware
d.
All of the above
Applications systems False
developed within the
framework of the traditional
SDLC are designed to
anticipate a software attack
that requires some degree
of application
reconstruction.
Select one:
True
False
,Part of the logical design d.
phase of the SecSDLC is Incident response
planning for partial or
catastrophic loss. ____
dictates what immediate
steps are taken when an
attack occurs.
Select one:
a.
Security response
b.
Continuity planning
c.
Disaster recovery
d.
Incident response
__________ security addresses c.
the issues necessary to Physical
protect the tangible items,
objects, or areas of an
organization from
unauthorized access and
misuse.
Select one:
a.
Object
b.
Personal
c.
Physical
d.
Standard
,Which of the following d.
phases is often considered maintenance and change
the longest and most
expensive phase of the
systems development life
cycle?
Select one:
a.
investigation
b.
implementation
c.
logical design
d.
maintenance and change
Which of the following is a a.
valid type of role when it All of the above
comes to data ownership?
Select one:
a.
All of the above
b.
Data owners
c.
Data custodians
d.
Data users
Of the two approaches to True
information security
implementation, the top-
down approach has a
higher probability of
success. _________________________
Select one:
True
False
, The possession of False
information is the quality or
state of having value for
some purpose or end.
Select one:
True
False
The investigation phase of True
the SecSDLC begins with a
directive from upper
management.
Select one:
True
False
__________ has become a a.
widely accepted evaluation NSTISSI No. 4011
standard for training and b.
education related to the
security of information
systems.
Select one:
a.
NSTISSI No. 4011
b.
ISO 17788
c.
NIST SP 800-12
d.
IEEE 802.11(g)
MULTICS stands for False
Multiple Information and
Computing Service.
_________________________
Select one:
True
False