Computer Security Quiz 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The "A" in CIA triad stands for "authenticity".

False

Availability assures that systems works promptly and service is not denied to authorized users.

True

A threat action in which sensitive data are directly released to an unauthorized entity is __________. a. corruption b. intrusion c. disruption d. exposure

d. exposure

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user. a. inference b. repudiation c. interception d. masquerade

d. masquerade

In the context of security our concern is with the vulnerabilities of system resources.

True

Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them.

True

Computer security is protection of the integrity, availability, and confidentiality of information system resources.

True

Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences. a. unsupation b. deception c. disruption d. unauthorized disclosure

b. Deception

A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. a. normal b. low c. high d. moderate

c. high

A __________ is any action that compromises the security of information owned by an organization. a. security policy b. security service c. security attack d. security mechanism

c. security attack


संबंधित स्टडी सेट्स

Care and prevention test 1 study guide

View Set

Intermediate Accounting Smartbook Ch. 8

View Set

Principles of Management CH. 5&6 Cate Loes

View Set