Ch 1
______ is a network project that preceded the Internet.
ARPANET
The ________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.
Analysis
The protection of all communications media, technology, and content is known as ______.
Communications security.
A technique used to compromise a system is known as an ______.
Exploit
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.
False
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as _____.
Physical security.
Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ______.
Threat
A (project team) should consists of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas.
True
An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer systems, hardware, or other tangible object. Either way, the resource is known as an _____>
asset
A computer is the ________ of an attach when it is the entity being targeted.
object