quiz1 Information Security Essay

Submitted By SjarexGmailCom
Words: 814
Pages: 4

Score for this quiz: 86 out of 90
Submitted Jul 13 at 1:15pm
This attempt took 11 minutes. Question 1
4 / 4 pts
____ was the first operating system to integrate security as its core functions. UNIX DOX
Correct!

MULTICS ARPANET Question 2
4 / 4 pts
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
Correct!

Physical

Personal

Object

Standard

Question 3
4 / 4 pts
A(n) ____ attack is a hacker using a personal computer to break into a system. indirect Correct! direct

software

hardware

Question 4
0 / 4 pts
A computer is the ____ of an attack when it is used to conduct the attack.
Correct Answer subject You Answered WRONG object target

facilitator

Question 5
4 / 4 pts
____ of information is the quality or state of being genuine or original.
Correct!

Authenticity

Spoofing

Confidentiality

Authorization

Question 6
4 / 4 pts
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value. key

hashing Correct! hash

code

Question 7
4 / 4 pts
An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization. software

hardware

data Correct! All of the above

Question 8
4 / 4 pts
The most successful kind of top-down approach involves a formal development strategy referred to as a ____. systems design

development life project Correct! systems development life cycle

systems schema

Question 9
4 / 4 pts
The ____ model consists of six general phases. pitfall

5SA&D
Correct!

waterfall

SysSP

Question 10
4 / 4 pts
During the ____ phase, specific technologies are selected to support the alternatives identified and evaluated in the logical design. investigation

implementation

analysis Correct! physical design

Question 11
4 / 4 pts
Which of the following phases is the longest and most expensive phase of the systems development life cycle? investigation

logical design

implementation Correct! maintenance and change

Question 12
4 / 4 pts
Organizations are moving toward more ____-focused development approaches, seeking to improve not only the functionality of the systems they have in place, but consumer confidence in their product.
Correct!

security

reliability

accessibility

availability

Question 13
4 / 4 pts
Which of the following is a valid type of data ownership? Data owners

Data custodians

Data users Correct! All of the above

Question 14
4 / 4 pts
Which of the following functions does information security perform for an organization? Protecting the organization's ability to function Enabling the safe operation of applications implemented on the organization's IT systems. Protecting the data the organization collects and uses Correct! All of the above

Question 15
4 / 4 pts
____ are software programs that hide their true nature, and reveal their designed behavior only when activated. Viruses

Worms

Spam Correct! Trojan horses

Question 16
3 / 3 pts
Which of the following is an example of a Trojan horse program? Netsky

MyDoom

Klez Correct! Happy99.exe

Question…