100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Test Bank for Principles of Information Security, 7th Edition by Michael E. Whitman, All chapters |Newest update

Puntuación
5.0
(1)
Vendido
3
Páginas
402
Grado
A+
Subido en
13-09-2025
Escrito en
2025/2026

Test Bank for Principles of Information Security, 7th Edition by Michael E. Whitman, All chapters |Newest update

Institución
Information Security, 7th Edition
Grado
Information Security, 7th Edition














Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Institución
Information Security, 7th Edition
Grado
Information Security, 7th Edition

Información del documento

Subido en
13 de septiembre de 2025
Número de páginas
402
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

@
Name: Class: Date:




Te
st
Full Test Bank for Principles of Information Security, 7th




ba
Edition Module 1-12




nk
Module 1 Introduction to Information Security




m
True / False




af
1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
N




ia
the products of the systems, and sabotage.
a. True
b. False
U
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
R
REFERENCES: H1: Introduction to Information Security
p. 2
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/2/2017 3:48 PM
D
2. Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
a. True
O
b. False
ANSWER: False
POINTS: 1
C
REFERENCES: H1: What is Security?
p. 8
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 1:54 PM

3. When a computer is the subject of an attack, it is the entity being attacked.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 1


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 10




st
H1: What is Security?
H2: Key Information Security Concepts




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
4. The value of information comes from the characteristics it possesses.
a. True
b. False
U
ANSWER: True
POINTS: 1
REFERENCES: p. 11
R
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
D
5. E-mail spoofing involves sending an e-mail message with a harmful attachment.
a. True
b. False
O
ANSWER: False
POINTS: 1
REFERENCES: p. 13
C
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 2:02 PM

6. The possession of information is the quality or state of having value for some purpose or end.
a. True
b. False
ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 2


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 13




st
H1: What is Security?
H2: Critical Characteristics of Information




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
7. A breach of possession may not always result in a breach of confidentiality.
a. True
b. False
U
ANSWER: True
POINTS: 1
REFERENCES: p. 14
R
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM
D
8. Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
a. True
b. False
O
ANSWER: False
POINTS: 1
REFERENCES: p. 16
C
H1: Components of An Information System
H2: Data
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM

9. Information security can be an absolute.
a. True
b. False
ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 3


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 17




st
H1: Security and The Organization
H2: Balancing Information Security and Access




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
10. To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the
security level must allow reasonable access, yet protect against threats.
a. True
U
b. False
ANSWER: True
POINTS: 1
R
REFERENCES: p. 17
H1: Security and The Organization
H2: Balancing Information Security and Access
SE
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 5:20 PM
D
11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
a. True
O
b. False
ANSWER: False
POINTS: 1
C
REFERENCES: p. 18
H1: Security and The Organization
H2: Approaches to Information Security Implementation
QUESTION TYPE:
S
True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

12. Using a methodology will usually have no effect on the probability of success.
a. True
b. False

Copyright Cengage Learning. Powered by Cognero. Page 4


Testbankmafia

, @
Name: Class: Date:




Te
ANSWER: False
POINTS: 1




st
REFERENCES: H1: Security and The Organization
H2: Approaches to Information Security Implementation




ba
p. 18
QUESTION TYPE: True / False




nk
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information




m
security
DATE CREATED: 9/14/2016 10:29 AM




af
N
DATE MODIFIED: 12/4/2016 2:12 PM




ia
13. A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in
project management and information security technical requirements.
U
a. True
b. False
ANSWER: False
R
POINTS: 1
REFERENCES: H1: Security and The Organization
H2: Security Professionals
SE
p. 20
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
profession of dentistry.
DATE CREATED: 9/14/2016 10:29 AM
D
DATE MODIFIED: 9/14/2016 10:29 AM

14. A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of
O
the information.
a. True
b. False
C
ANSWER: True
POINTS: 1
REFERENCES: p. 20
S
H1: Security and The Organization
H2: Data Responsibilities
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
profession of dentistry.
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

15. The roles of information security professionals focus on protecting the organization’s information systems and stored
information from attacks.
Copyright Cengage Learning. Powered by Cognero. Page 5


Testbankmafia

, @
Name: Class: Date:




Te
a. True
b. False




st
ANSWER: True
POINTS: 1




ba
REFERENCES: p. 20
H1: Security and The Organization




nk
H2: Communities of Interest
QUESTION TYPE: True / False




m
HAS VARIABLES: False




af
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
N
profession of dentistry.




ia
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/8/2021 10:44 AM
U
Modified True / False

16. Every organization, whether public or private and regardless of size, has information it wants to protect. ______
R
ANSWER: True
POINTS: 1
REFERENCES: H1: Introduction to Information Security
SE
p. 2
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.1 - Define information security
D
DATE CREATED: 4/6/2021 8:48 AM
DATE MODIFIED: 4/8/2021 10:46 AM

17. The history of information security begins with the concept of communications security. ______
O
ANSWER: False - computer
POINTS: 1
REFERENCES: H1: Introduction to Information Security
C
p. 3
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
S
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 4/6/2021 8:50 AM
DATE MODIFIED: 4/8/2021 10:46 AM

18. RAND Report R-609 was the first widely recognized published document to identify the role of management and
policy issues in computer security. ______
ANSWER: True
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 6


Testbankmafia

, @
Name: Class: Date:




Te
REFERENCES: p. 5
H1: Introduction to Information Security
H2: The 1970s and ’80s




st
QUESTION TYPE: Modified True / False




ba
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security




m
DATE CREATED: 4/6/2021 8:53 AM
DATE MODIFIED: 4/8/2021 10:46 AM




af
N




ia
19. Much of the early research on computer security centered on a system called Management Information and
Computing Service (MULTICS). _______
ANSWER: False - Multiplexed
U
POINTS: 1
REFERENCES: p. 6
H1: Introduction to Information Security
R
H2: The 1970s and ’80s
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
SE
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/8/2021 10:46 AM
D
20. According to the CNSS, networking is ―the protection of information and its critical elements.‖ _______
ANSWER: False - information security
POINTS: 1
O
REFERENCES: p. 8
H1: What is Security?
QUESTION TYPE: Modified True / False
C
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.1 - Define information security
S
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/7/2021 6:36 PM

21. Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control
of a threat. _______
ANSWER: True
POINTS: 1
REFERENCES: p. 9
H1: What is Security?
H2: Key Information Security Concepts
QUESTION TYPE: Modified True / False
Copyright Cengage Learning. Powered by Cognero. Page 7


Testbankmafia
$12.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Reseñas de compradores verificados

Se muestran los comentarios
2 meses hace

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Testbanksmafia Michigan State University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
161
Miembro desde
1 año
Número de seguidores
12
Documentos
445
Última venta
3 días hace
Test Banks, Solution Manuals, Case studies, Summaries, Essays, and Exclusive Package Deals, All Graded A+.

Welcome to my store! In need to elevate your academic grades? search no more. Here you'll find thousands of comprehensive 5-star rated resources designed to empower you on your academic journey. I'm dedicated to provide you with top-quality, accurate , reliable , verified and latest updated documents with 100% pass guarantee. Your success is our priority, Let's achieve those top grades together !!!

4.6

14 reseñas

5
11
4
2
3
0
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes