midterm Security Chapter 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Availability assures that systems works promptly and service is not denied to authorized users. True or False

True

Computer security is protection of the integrity, availability, and confidentiality of information system resources. True or False

True

Data integrity assures that information and programs are changed only in a specified and authorized manner. True or False

True

A loss of ______ is the unauthorized disclosure of information. A. confidentiality B. integrity C. authenticity D. availability

A. Confidentiality

__________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. A. System Integrity B. Data Integrity C. Availability D. Confidentiality

A. System Integrity

A(n) ______________is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.

Attack

Confidentiality, Integrity, and Availability form what is often referred to as the ________________.

CIA triad

___________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.

Computer Security

In the United States, student grade information is an asset whose confidentiality is regulated by the ________.

FERPA (Family Educational Rights and Privacy Act)

The "A" in the CIA triad stands for "authenticity". True or False

False

Threats are attacks carried out. True or False

False

A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) ._______________ A. countermeasure B. vulnerability C. adversary D. risk

B. Vulnerability

____________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. A. Availability B. System Integrity C. Privacy D. Data Integrity

C. Privacy

A. ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. A. low B. normal C. moderate D. high

D. High

A loss of ___________ is the disruption of access to or use of information or an information system.

availability


Set pelajaran terkait

Molecular Microbiology Final Homework Questions

View Set

abrams endocrine prepu post week 5

View Set

Implicit Association Test (IAT) ZAPS

View Set

ISDS 3115 Carolyn Borne Chapter 1

View Set

Chapter 26 Head and Spine Injuries

View Set

Persian grammar phrases: present perfect subjunctive

View Set