Ch.1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

_____ limits who gains access to the database while _____ limits what a user can access within the database.

Access authentication, view definition

Which of the following information security management system benefits deals with continuous improvement?

Act as framework

Which of the following is NOT an example of an information security management policy or procedure?

All employees can use the lunch room

In regards to information security, which of the following is part of identity and access management?

All of the answers are correct

Which of the following is a focus for information security?

All of the answers are correct

What would be an example of a violation of the principle of confidentiality?

An employee accessing a payroll database to find out how much others are paid

A company suffered a security breach. What is the very first thing the company needs to do?

Assess the possible areas that were affected by the breach

_____ is the process of transforming data into an unreadable form to anyone who does not know the key.

Data encryption

What is the single best way to protect your device?

Do not root it

What is NOT an example of physical security?

Encrypting email messages

_____ are threats to a database system.

Hackers and SQL injection attacks

Which of the following is NOT an example of a method used in information security?

Honor of reputation

Which of the following is NOT a benefit of an information management security system?

Increase efficiency

_____ refers to the process of making sure only those who are entitled to information can access it?

Information security

As part of implementing applications security, which of the following would a company have to do?

Install tools for identifying vulnerabilities in code

Why should security testing be a part of information security requirements?

It checks to see if expected security protection really is in place.

What is security management?

Managing the security of all data and servers in the organization

How big is the code required to turn an app into spyware?

Only a few lines

What is the main idea behind the principle of availability in information security?

People who are authorized to view data can do so when they need access

What should users keep in mind about their devices?

Phones and tablets are more similar to computer more than ever

Where should apps come from for corporate devices?

Preferably only the app store, unless it is a company app

The _____ ensures that people only have access to the information they need to do their jobs.

Principle of least privilege

What is the purpose of security operations in regards to information security?

Provide procedures and plans for maintaining security, such as security patching procedures, incident response and disaster recovery plans

As part of implementing systems security, which of the following would a company need to do?

Require secure passwords

A fast way to get a disrupted system that has been breached up and running is to:

Restore an updated data backup

Why does data need to have a recorded owner?

The data owner makes decisions about access to the data.

What does it mean when you hear that a company suffered a security breach?

The data servers and data from the company was accessed by unauthorized personnel

Which of these is something that remote access provides?

Wiping mechanism

Which of the following is NOT a type of information security?

financial database management

Database security management:

is the collection of processes and procedures used to protect data and database systems


Kaugnay na mga set ng pag-aaral

Health Assessment Exam 3 Practice Questions

View Set

Introduction to Java Programming: Ch. 4 quiz

View Set

CHAPTER 7: Credit cards and consumer loans

View Set

1-Network Fundamentals - Basic Question_14548700_2023_01_05_20_23

View Set

PassPoint - Mood, Adjustment, and Dementia Disorders

View Set

NCLEX Questions for Nursing 102 Exam #2

View Set

Math SAT Level I - Chapter 4 Ratios and Proportions

View Set