Chapter 1 Review Questions

Chapter 1 Review Questions - Chapter 1 Review Questions...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 1 Review Questions Review of attempt 1 Started on Wednesday, May 18, 2011, 08:16 PM Completed on Sunday, May 22, 2011, 07:37 AM Time taken 3 days 11 hours Grade 98 out of a maximum of 100 ( 98 %) Question 1 Marks: 2 Information security can begin as a grassroots effort in which systems administrators attempt to improve the security of their systems, which is often referred to as a bottom-up approach. Answer: True False Correct Marks for this submission: 2/2. Question 2 Marks: 2 Confidentiality ensures that only those with the rights and privileges to access information are able to do so. Answer: True False Correct Marks for this submission: 2/2. Question 3 Marks: 2 A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. Answer: True False Correct Marks for this submission: 2/2.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Question 4 Marks: 2 Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. ____ dictates what steps are taken when an attack occurs. Choose one answer. a. Continuity planning b. Incident response c. Disaster recovery d. Security response Correct Marks for this submission: 2/2. Question 5 Marks: 2 A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information. Answer: True False Correct Marks for this submission: 2/2. Question 6 Marks: 2 A famous study entitled “Protection Analysis: Final Report” was published in ____. Choose one answer. a. 1868 b. 1978 c. 1988 d. 1998 Correct Marks for this submission: 2/2. Question 7 Marks: 2
Background image of page 2
During the early years, information security was a straightforward process composed predominantly of ____________________ security and simple document classification schemes. Answer: Correct Marks for this submission: 2/2. Question 8 Marks: 2 In an organization, the value of ____________________ of information is especially high when it involves personal information about employees, customers, or patients. Answer: Correct Marks for this submission: 2/2. Question 9 Marks: 2 During the ____________________ War, many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers. Answer: Correct Marks for this submission: 2/2. Question 10 Marks: 2 In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/01/2011 for the course CNS 1 taught by Professor Idk during the Spring '11 term at Texas State Technical Colleges.

Page1 / 14

Chapter 1 Review Questions - Chapter 1 Review Questions...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online