merkow_tb_02

Merkow_tb_02 - CHAPTER 2 INFORMATION SECURITY PRINCIPLES OF SUCCESS Multiple Choice 1 Given enough time tools inclination and a hacker can break

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
CHAPTER 2: INFORMATION SECURITY PRINCIPLES OF SUCCESS Multiple Choice: 1. Given enough time, tools, inclination, and ____________, a hacker can break through any security measure. A. talent B. skills C. intelligence D. assets Answer: B Reference: Principle 1: There Is No Such Thing Difficulty: moderate 2. In 2003 the Whitworth Gallery’s layered security system included all of the following except: A. Closed-circuit television B. Alarm systems C. Electronic motion sensors D. Rolling patrols. Answer: C Reference: Principle 1: There Is No Such Thing Difficulty: moderate 3. Which of the following is not a common class of ratings for safes? A. B-rate B. C-rate C. ULTL-30 D. ULTL-40 Answer: D Reference: Principle 1: There Is No Such Thing Difficulty: moderate 4. The goals of information security measures include: A. Protecting confidentiality of data B. Preserving the integrity of data C. Promoting the availability of data for authorized use
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
D. All of the above are goals Answer: D Reference: Principle 2: The Three Security Goals Difficulty: moderate 5. IS professionals who create a plan to protect a computer system consider all of the following in the planning process except: A. Defining the structural composition of data B. Protecting the confidentiality of data C. Preserving the integrity of data D. Promoting the availability of data for authorized use Answer: A Reference: Principle 2: The Three Security Goals Difficulty: moderate 6. Synonyms for confidentiality include all of the following except: A. privacy B. secrecy C. integrity D. discretion Answer: C Reference: FYI: Confidentiality by Another Name Difficulty: moderate 7. Which of the following is NOT a goal of an integrity model security system? A. Preventing unauthorized users from modifying data or programs B. Verifying data consistency for internal and external programs C. Preventing authorized users form making unauthorized modifications D. Maintaining internal and external consistency of data and programs Answer: B Reference: Integrity Models Difficulty: moderate 8. Common availability challenges do NOT include which of the following? A. Equipment failure B. Denial of service C. Rapid spread of viruses D. Loss of information system due to natural disaster or human action. Answer: C Reference: Availability Models Difficulty: moderate
Background image of page 2
9. Which of the following is NOT an activity designed to preserve information system availability? A. Grant access to authorized personnel B. Apply encryption to information sent over the Internet C. Develop a disaster recovery plan D. All of the above preserve system availability. Answer: D Reference: Availability Models Difficulty: moderate 10. Layered security is also referred to as: A. Denial of service B. Defense in depth C. Multi-system security D. None of the above. Answer:
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/05/2011 for the course IT 6392 taught by Professor Smith during the Spring '10 term at GCSU.

Page1 / 10

Merkow_tb_02 - CHAPTER 2 INFORMATION SECURITY PRINCIPLES OF SUCCESS Multiple Choice 1 Given enough time tools inclination and a hacker can break

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online