100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Test Bank for Principles of Information Security, 7th Edition by Michael E. Whitman, All chapters |Newest update

Beoordeling
5,0
(1)
Verkocht
3
Pagina's
402
Cijfer
A+
Geüpload op
13-09-2025
Geschreven in
2025/2026

Test Bank for Principles of Information Security, 7th Edition by Michael E. Whitman, All chapters |Newest update

Instelling
Information Security, 7th Edition
Vak
Information Security, 7th Edition














Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Gekoppeld boek

Geschreven voor

Instelling
Information Security, 7th Edition
Vak
Information Security, 7th Edition

Documentinformatie

Geüpload op
13 september 2025
Aantal pagina's
402
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

@
Name: Class: Date:




Te
st
Full Test Bank for Principles of Information Security, 7th




ba
Edition Module 1-12




nk
Module 1 Introduction to Information Security




m
True / False




af
1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
N




ia
the products of the systems, and sabotage.
a. True
b. False
U
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
R
REFERENCES: H1: Introduction to Information Security
p. 2
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/2/2017 3:48 PM
D
2. Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
a. True
O
b. False
ANSWER: False
POINTS: 1
C
REFERENCES: H1: What is Security?
p. 8
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 1:54 PM

3. When a computer is the subject of an attack, it is the entity being attacked.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 1


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 10




st
H1: What is Security?
H2: Key Information Security Concepts




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
4. The value of information comes from the characteristics it possesses.
a. True
b. False
U
ANSWER: True
POINTS: 1
REFERENCES: p. 11
R
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
D
5. E-mail spoofing involves sending an e-mail message with a harmful attachment.
a. True
b. False
O
ANSWER: False
POINTS: 1
REFERENCES: p. 13
C
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 2:02 PM

6. The possession of information is the quality or state of having value for some purpose or end.
a. True
b. False
ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 2


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 13




st
H1: What is Security?
H2: Critical Characteristics of Information




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
7. A breach of possession may not always result in a breach of confidentiality.
a. True
b. False
U
ANSWER: True
POINTS: 1
REFERENCES: p. 14
R
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
SE
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM
D
8. Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
a. True
b. False
O
ANSWER: False
POINTS: 1
REFERENCES: p. 16
C
H1: Components of An Information System
H2: Data
QUESTION TYPE: True / False
S
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM

9. Information security can be an absolute.
a. True
b. False
ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 3


Testbankmafia

, @
Name: Class: Date:




Te
POINTS: 1
REFERENCES: p. 17




st
H1: Security and The Organization
H2: Balancing Information Security and Access




ba
QUESTION TYPE: True / False
HAS VARIABLES: False




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security




m
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM




af
N




ia
10. To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the
security level must allow reasonable access, yet protect against threats.
a. True
U
b. False
ANSWER: True
POINTS: 1
R
REFERENCES: p. 17
H1: Security and The Organization
H2: Balancing Information Security and Access
SE
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 5:20 PM
D
11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
a. True
O
b. False
ANSWER: False
POINTS: 1
C
REFERENCES: p. 18
H1: Security and The Organization
H2: Approaches to Information Security Implementation
QUESTION TYPE:
S
True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

12. Using a methodology will usually have no effect on the probability of success.
a. True
b. False

Copyright Cengage Learning. Powered by Cognero. Page 4


Testbankmafia

, @
Name: Class: Date:




Te
ANSWER: False
POINTS: 1




st
REFERENCES: H1: Security and The Organization
H2: Approaches to Information Security Implementation




ba
p. 18
QUESTION TYPE: True / False




nk
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information




m
security
DATE CREATED: 9/14/2016 10:29 AM




af
N
DATE MODIFIED: 12/4/2016 2:12 PM




ia
13. A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in
project management and information security technical requirements.
U
a. True
b. False
ANSWER: False
R
POINTS: 1
REFERENCES: H1: Security and The Organization
H2: Security Professionals
SE
p. 20
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
profession of dentistry.
DATE CREATED: 9/14/2016 10:29 AM
D
DATE MODIFIED: 9/14/2016 10:29 AM

14. A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of
O
the information.
a. True
b. False
C
ANSWER: True
POINTS: 1
REFERENCES: p. 20
S
H1: Security and The Organization
H2: Data Responsibilities
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
profession of dentistry.
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

15. The roles of information security professionals focus on protecting the organization’s information systems and stored
information from attacks.
Copyright Cengage Learning. Powered by Cognero. Page 5


Testbankmafia

, @
Name: Class: Date:




Te
a. True
b. False




st
ANSWER: True
POINTS: 1




ba
REFERENCES: p. 20
H1: Security and The Organization




nk
H2: Communities of Interest
QUESTION TYPE: True / False




m
HAS VARIABLES: False




af
LEARNING OBJECTIVES: DENT.SING.22.01.4 - Name the individuals who had a great impact on the
N
profession of dentistry.




ia
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/8/2021 10:44 AM
U
Modified True / False

16. Every organization, whether public or private and regardless of size, has information it wants to protect. ______
R
ANSWER: True
POINTS: 1
REFERENCES: H1: Introduction to Information Security
SE
p. 2
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.1 - Define information security
D
DATE CREATED: 4/6/2021 8:48 AM
DATE MODIFIED: 4/8/2021 10:46 AM

17. The history of information security begins with the concept of communications security. ______
O
ANSWER: False - computer
POINTS: 1
REFERENCES: H1: Introduction to Information Security
C
p. 3
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
S
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 4/6/2021 8:50 AM
DATE MODIFIED: 4/8/2021 10:46 AM

18. RAND Report R-609 was the first widely recognized published document to identify the role of management and
policy issues in computer security. ______
ANSWER: True
POINTS: 1
Copyright Cengage Learning. Powered by Cognero. Page 6


Testbankmafia

, @
Name: Class: Date:




Te
REFERENCES: p. 5
H1: Introduction to Information Security
H2: The 1970s and ’80s




st
QUESTION TYPE: Modified True / False




ba
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic




nk
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security




m
DATE CREATED: 4/6/2021 8:53 AM
DATE MODIFIED: 4/8/2021 10:46 AM




af
N




ia
19. Much of the early research on computer security centered on a system called Management Information and
Computing Service (MULTICS). _______
ANSWER: False - Multiplexed
U
POINTS: 1
REFERENCES: p. 6
H1: Introduction to Information Security
R
H2: The 1970s and ’80s
QUESTION TYPE: Modified True / False
HAS VARIABLES: False
SE
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/8/2021 10:46 AM
D
20. According to the CNSS, networking is ―the protection of information and its critical elements.‖ _______
ANSWER: False - information security
POINTS: 1
O
REFERENCES: p. 8
H1: What is Security?
QUESTION TYPE: Modified True / False
C
HAS VARIABLES: False
STUDENT ENTRY MODE: Basic
LEARNING OBJECTIVES: POIS.WHMA.22.01.1 - Define information security
S
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 4/7/2021 6:36 PM

21. Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control
of a threat. _______
ANSWER: True
POINTS: 1
REFERENCES: p. 9
H1: What is Security?
H2: Key Information Security Concepts
QUESTION TYPE: Modified True / False
Copyright Cengage Learning. Powered by Cognero. Page 7


Testbankmafia

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
2 maanden geleden

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Testbanksmafia Michigan State University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
161
Lid sinds
1 jaar
Aantal volgers
12
Documenten
445
Laatst verkocht
2 dagen geleden
Test Banks, Solution Manuals, Case studies, Summaries, Essays, and Exclusive Package Deals, All Graded A+.

Welcome to my store! In need to elevate your academic grades? search no more. Here you'll find thousands of comprehensive 5-star rated resources designed to empower you on your academic journey. I'm dedicated to provide you with top-quality, accurate , reliable , verified and latest updated documents with 100% pass guarantee. Your success is our priority, Let's achieve those top grades together !!!

4,6

14 beoordelingen

5
11
4
2
3
0
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen