Name: Class: Date:
Te
st
Full Test Bank for Principles of Information Security, 7th
ba
Edition Module 1-12
nk
Module 1 Introduction to Information Security
m
True / False
af
1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
N
ia
the products of the systems, and sabotage.
a. True
b. False
U
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
R
REFERENCES: H1: Introduction to Information Security
p. 2
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/2/2017 3:48 PM
D
2. Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
a. True
O
b. False
ANSWER: False
POINTS: 1
C
REFERENCES: H1: What is Security?
p. 8
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 1:54 PM
3. When a computer is the subject of an attack, it is the entity being attacked.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 1
Testbankmafia
, @
Name: Class: Date:
Te
POINTS: 1
REFERENCES: p. 10
st
H1: What is Security?
H2: Key Information Security Concepts
ba
QUESTION TYPE: True / False
HAS VARIABLES: False
nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
af
N
ia
4. The value of information comes from the characteristics it possesses.
a. True
b. False
U
ANSWER: True
POINTS: 1
REFERENCES: p. 11
R
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
D
5. E-mail spoofing involves sending an e-mail message with a harmful attachment.
a. True
b. False
O
ANSWER: False
POINTS: 1
REFERENCES: p. 13
C
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 2:02 PM
6. The possession of information is the quality or state of having value for some purpose or end.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 2
Testbankmafia
, @
Name: Class: Date:
Te
POINTS: 1
REFERENCES: p. 13
st
H1: What is Security?
H2: Critical Characteristics of Information
ba
QUESTION TYPE: True / False
HAS VARIABLES: False
nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
af
N
ia
7. A breach of possession may not always result in a breach of confidentiality.
a. True
b. False
U
ANSWER: True
POINTS: 1
REFERENCES: p. 14
R
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM
D
8. Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
a. True
b. False
O
ANSWER: False
POINTS: 1
REFERENCES: p. 16
C
H1: Components of An Information System
H2: Data
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM
9. Information security can be an absolute.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 3
Testbankmafia
, @
Name: Class: Date:
Te
POINTS: 1
REFERENCES: p. 17
st
H1: Security and The Organization
H2: Balancing Information Security and Access
ba
QUESTION TYPE: True / False
HAS VARIABLES: False
nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
af
N
ia
10. To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the
security level must allow reasonable access, yet protect against threats.
a. True
U
b. False
ANSWER: True
POINTS: 1
R
REFERENCES: p. 17
H1: Security and The Organization
H2: Balancing Information Security and Access
SE
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 5:20 PM
D
11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
a. True
O
b. False
ANSWER: False
POINTS: 1
C
REFERENCES: p. 18
H1: Security and The Organization
H2: Approaches to Information Security Implementation
QUESTION TYPE:
S
True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
12. Using a methodology will usually have no effect on the probability of success.
a. True
b. False
Copyright Cengage Learning. Powered by Cognero. Page 4
Testbankmafia
, @
Name: Class: Date:
Te
ANSWER: False
POINTS: 1
st
REFERENCES: H1: Security and The Organization
H2: Approaches to Information Security Implementation
ba
p. 18
QUESTION TYPE: True / False
nk
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
m
security
DATE CREATED: 9/14/2016 10:29 AM
af
N
DATE MODIFIED: 12/4/2016 2:12 PM
ia
13. A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in
project management and information security technical requirements.
U
a. True
b. False
ANSWER: False
R
POINTS: 1
REFERENCES: H1: Security and The Organization
H2: Security Professionals
SE
p. 20
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
profession of dentistry.
DATE CREATED: 9/14/2016 10:29 AM
D
DATE MODIFIED: 9/14/2016 10:29 AM
14. A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of
O
the information.
a. True
b. False
C
ANSWER: True
POINTS: 1
REFERENCES: p. 20
S
H1: Security and The Organization
H2: Data Responsibilities
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
profession of dentistry.
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
15. The roles of information security professionals focus on protecting the organization’s information systems and stored
information from attacks.
Copyright Cengage Learning. Powered by Cognero. Page 5
Testbankmafia
, @
Name: Class: Date:
Te
a. True
b. False
st
ANSWER: True
POINTS: 1
ba
REFERENCES: p. 20
H1: Security and The Organization
nk
H2: Communities of Interest
QUESTION TYPE: True / False
m
HAS VARIABLES: False
af
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
N
profession of dentistry.
ia
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/8/2021 10:44 AM
U
Modified True / False
16. Every organization, whether public or private and regardless of size, has information it wants to protect. ______
R
ANSWER: True
POINTS: 1
REFERENCES: H1: Introduction to Information Security
SE
p. 2
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.1 - Define information security
D
DATE CREATED: 4/6/2021 8:48 AM
DATE MODIFIED: 4/8/2021 10:46 AM
17. The history of information security begins with the concept of communications security. ______
O
ANSWER: False - computer
POINTS: 1
REFERENCES: H1: Introduction to Information Security
C
p. 3
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
S
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 4/6/2021 8:50 AM
DATE MODIFIED: 4/8/2021 10:46 AM
18. RAND Report R-609 was the first widely recognized published document to identify the role of management and
policy issues in computer security. ______
ANSWER: True
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 6
Testbankmafia
, @
Name: Class: Date:
Te
REFERENCES: p. 5
H1: Introduction to Information Security
H2: The 1970s and ’80s
st
QUESTION TYPE: Modified True / False
ba
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
m
DATE CREATED: 4/6/2021 8:53 AM
DATE MODIFIED: 4/8/2021 10:46 AM
af
N
ia
19. Much of the early research on computer security centered on a system called Management Information and
Computing Service (MULTICS). _______
ANSWER: False - Multiplexed
U
POINTS: 1
REFERENCES: p. 6
H1: Introduction to Information Security
R
H2: The 1970s and ’80s
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
SE
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/8/2021 10:46 AM
D
20. According to the CNSS, networking is ―the protection of information and its critical elements.‖ _______
ANSWER: False - information security
POINTS: 1
O
REFERENCES: p. 8
H1: What is Security?
QUESTION TYPE: Modified True / False
C
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.1 - Define information security
S
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/7/2021 6:36 PM
21. Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control
of a threat. _______
ANSWER: True
POINTS: 1
REFERENCES: p. 9
H1: What is Security?
H2: Key Information Security Concepts
QUESTION TYPE: Modified True / False
Copyright Cengage Learning. Powered by Cognero. Page 7
Testbankmafia