Computer Security Quiz 1
The "A" in CIA triad stands for "authenticity".
False
Availability assures that systems works promptly and service is not denied to authorized users.
True
A threat action in which sensitive data are directly released to an unauthorized entity is __________. a. corruption b. intrusion c. disruption d. exposure
d. exposure
An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user. a. inference b. repudiation c. interception d. masquerade
d. masquerade
In the context of security our concern is with the vulnerabilities of system resources.
True
Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them.
True
Computer security is protection of the integrity, availability, and confidentiality of information system resources.
True
Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences. a. unsupation b. deception c. disruption d. unauthorized disclosure
b. Deception
A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. a. normal b. low c. high d. moderate
c. high
A __________ is any action that compromises the security of information owned by an organization. a. security policy b. security service c. security attack d. security mechanism
c. security attack