Chapter 2 Information Secuirty Principles of Success

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following represents the three goals of information security? A. Confidentiality, integrity, and availability B. Prevention, detection, and response C. People controls, process controls, and technology controls D. Network security, PC security and mainframe security

A. Confidentiality, Integrity and availability

Which of the following statements is true? A. Controls are implemented to eliminate risk and eliminate the potential loss. B. Controls are implemented to mitigate risk and reduce the potential for loss C. Controls are implemented to eliminate risk and reduce the potential for loss. D. Controls are implements to mitigate risk and eliminate the potential for loss.

A. Controls are implemented to eliminate risk and eliminate the potential loss.

Which of the following statements is true? A. Security assurance requirements describe how to test the system. B. Security assurance requirements describe how to program the system. C. Security assurance requirements describe to what degree the testing of the system is conducted. D. Security assurance requirements implementation considerations.

A. Security assurance requirements describe how to test the system.

The CIA triad is often represented by which of the following? A. Triangle B. Diagonal C. Ellipse D. Circle

A. Triangle

Which of the following terms best describes the absence of weakness in a system that may possibility be exploited? A. Vulnerability B. Threat C. Risk D. Exposure

A. Vulnerability

Security functional requirements describe which of the following? A. What a security system should do by design B. What controls a security system must implement C. Quality assurance description and testing approach D. How to implement the system

A. What a security system should do by design

Related to information security, confidentiality is the opposite of which of the following? A. Closure B. Disclosure C. Disaster D. Disposal

B. Disclosure

Which of the following terms best describes a cookbook on how to take advantage of a vulnerability. A. risk B. exploit C. Threat D. Program

B. Exploit

Which of the following represents the three types of security controls. A. People functions and technology B. People, process, and technology C. Technology, roles and separation of duties D. Separation of duties processes and people

B. People, process and technology

Which of the following best represents the two types of IT security requirements? A. functional and logical B. Logical and physical C. Functional and assurance D. Functional and physical

C. Functional and assurance

Which of the following terms best describes the assurance that data has not been changed unintentionally due to an accident or malice? A. Availability B. Confidentiality C. Integrity D. Audibility

C. Integrity

Defense in depth is needed to unsure that which three mandatory activities are present in a security system? A. Prevention, res ponce, and prosecution B. Response, collection of evidence, and prosecution C. Prevention, detection and response D. Prevention, response, and management

C. Prevention, detection and response

Which of the following terms best describe the probability that a threat to an information system will materialize? A. Threat B. Bulnerability C. Hole D. Risk

C. Risk

Which of the following statements is true? A. The weakest link in any security system is the technology element. B. The weakest link in any security system is the process element C. The weakest link in any security system is the human element D. Both B and C

C. The weakest link in any security system is the human element

Which of the following statements is true? A. Process controls for IT security include assignment of roles for least privilege B. Process controls for IT security include separation of duties C. Process for IT security include documents procedures. D. All of the above

D. All of the above


Conjuntos de estudio relacionados

Unit 3: Leases and Tenancy Agreements

View Set

CH 10 Quiz - Liens & Encumbrances

View Set

Stats Quiz #11 Z-Scores and Normal Distribution

View Set

Unit 3 Fundamentals (Medication Administration Ch.31)

View Set