100%(5)5 out of 5 people found this document helpful
This preview shows page 1 - 3 out of 5 pages.
Review Test Submission: Chapter 1 TestUserCourseCIST1601-Information Security Fund (61449)TestChapter 1 TestStartedSubmittedStatusCompletedAttempt Score20 out of 20 pointsTime Elapsed16 minutes out of 20 minutesResultsDisplayedAll Answers, Submitted Answers, Correct Answers, IncorrectlyAnswered QuestionsQuestion 11 out of 1 points__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.Selected Answer:a. NSTISSI No. 4011Answers:a. NSTISSI No. 4011b. ISO 17788c. IEEE 802.11(g)d. NIST SP 800-12Question 21 out of 1 pointsDirectattacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________Question 31 out of 1 pointsWhich of the following is a valid type of role when it comes to data ownership?