Cengage Final Exam Review Pt.1 (Modules
1-4) Questions and Correct Answers/
Latest Update / Already Graded
Network security focuses on the protection of physical items, objects,
or areas from unauthorized access and misuse. (T/F)
Ans: False
Network security focuses on the protection of physical items, objects,
or areas from unauthorized access and misuse. (T/F)
Ans: True
The bottom-up approach to information security has a higher
probability of success than the top-down approach. (T/F)
Ans: False
A data custodian works directly with data owners and is responsible for
the storage, maintenance, and protection of the information. (T/F)
Ans: True
The protection of the confidentiality, integrity, and availability of
information assets, whether in storage, processing, or transmission, via
All rights reserved © 2025/ 2026 |
, Page |2
the application of policy, education, training and awareness, and
technology is known as _____.
communications security
physical security
network security
information security
Ans: information Security
he protection of tangible items, objects, or areas from unauthorized
access and misuse is known as _____.
communications security
network security
information security
physical security
Ans: physical Security
Individuals who control and are responsible for the security and use of
a particular set of information are known as data _____.
All rights reserved © 2025/ 2026 |