This preview has intentionally blurred parts. Sign up to view the full document

View Full Document

Unformatted Document Excerpt

Chapter 1 Quiz Review of attempt 1 Started on Sunday, May 22, 2011, 07:43 AM Completed on Sunday, May 22, 2011, 07:51 AM Time taken 8 mins 11 secs Grade 100 out of a maximum of 100 ( 100 %) Question 1 Marks: 4 ____ of information is the quality or state of being genuine or original. Choose one answer. a. Authenticity b. Spoofing c. Confidentiality d. Authorization Correct Marks for this submission: 4/4. Question 2 Marks: 4 An e-mail virus involves sending an e-mail message with a modified field. Answer: True False Correct Marks for this submission: 4/4. Question 3 Marks: 4 A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information. Answer: True False Correct Marks for this submission: 4/4. Question 4 Marks: 4 A breach of possession always results in a breach of confidentiality. Answer: True False Correct Marks for this submission: 4/4. Question 5 Marks: 4 During the ____ phase, specific technologies are selected to support the alternatives identified and evaluated in the logical design. Choose one answer. a. investigation b. implementation c. analysis d. physical design Correct Marks for this submission: 4/4. Question 6 Marks: 4 A computer is the ____________________ of an attack when it is the target entity.... View Full Document

End of Preview

Sign up now to access the rest of the document