Ch 1

Ace your homework & exams now with Quizwiz!

______ is a network project that preceded the Internet.

ARPANET

The ________ phase consists primarily of assessments of the organization, its current systems, and its capability to support the proposed systems.

Analysis

The protection of all communications media, technology, and content is known as ______.

Communications security.

A technique used to compromise a system is known as an ______.

Exploit

Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse.

False

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as _____.

Physical security.

Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ______.

Threat

A (project team) should consists of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas.

True

An organizational resource that is being protected is sometimes logical, such as a Web site, software information, or data. Sometimes the resource is physical, such as a person, computer systems, hardware, or other tangible object. Either way, the resource is known as an _____>

asset

A computer is the ________ of an attach when it is the entity being targeted.

object


Related study sets

HUM210 Astone Film Multi-Choice Set 12

View Set

The Periodic Table and Periodic Law Study Guide

View Set

Energy and 🅱️ociety Presentations

View Set

End Behavior of 12 Basic Functions

View Set