Name: Class: Date: Copyright Cengage Learning. Powered by Cognero. Page 1 Full Test Bank for Principles of Information Securi ty, 7th Edition Module 1-12 Mod ule 1 Introduction to Information Security True / False 1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage. a. True b. False ANSWER: True POINTS: 1 DIFFICULTY: Easy REFERENCES: H1: Introduction to Information Security p. 2 QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it evolved into Information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 3/2/2017 3:48 PM 2. Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse. a. True b. False ANSWER: False POINTS: 1 REFERENCES: H1: What is Security? p. 8 QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 12/4/2016 1:54 PM 3. When a computer is the subject of an attack, it is the entity being attacked. a. True b. False ANSWER: False NURSEDOCS Name: Class: Date: Copyright Cengage Learning. Powered by Cognero. Page 2 POINTS: 1 REFERENCES: p. 10 H1: What is Security? H2: Key Information Security Concepts QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 9/14/2016 10:29 AM 4. The value of information comes from the characteristics it possesses. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p. 11 H1: What is Security? H2: Critical Characteristics of Information QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 9/14/2016 10:29 AM 5. E-mail spoofing involves sending an e-mail message with a harmful attachment. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p. 13 H1: What is Security? H2: Critical Characteristics of Information QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 12/4/2016 2:02 PM 6. The possession of information is the quality or state of having value for some purpose or end. a. True b. False ANSWER: False NURSEDOCS Name: Class: Date: Copyright Cengage Learning. Powered by Cognero. Page 3 POINTS: 1 REFERENCES: p. 13 H1: What is Security? H2: Critical Characteristics of Information QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 9/14/2016 10:29 AM 7. A breach of possession may not always result in a breach of confidentiality. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p. 14 H1: What is Security? H2: Critical Characteristics of Information QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 3/8/2017 11:50 AM 8. Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p. 16 H1: Components of An Information System H2: Data QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/201 6 10:29 AM DATE MODIFIED: 3/8/2017 11:50 AM 9. Information security can be an absolute. a. True b. False ANSWER: False NURSEDOCS Name: Class: Date: Copyright Cengage Learning. Powered by Cognero. Page 4 POINTS: 1 REFERENCES: p. 17 H1: Security and The Organization H2: Balancing Information Security and Access QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 9/14/2016 10:29 AM 10. To achieve balance—that is, to operate an information system that satisfies the user and the security professional —the security level must allow reasonable access, yet protect against threats. a. True b. False ANSWER: True POINTS: 1 REFERENCES: p. 17 H1: Security and The Organization H2: Balancing Information Security and Access QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED : 9/14/2016 10:29 AM DATE MODIFIED: 3/8/2017 5:20 PM 11. The bottom -up approach to information security has a higher probability of success than the top-down approach. a. True b. False ANSWER: False POINTS: 1 REFERENCES: p. 18 H1: Security and The Organization H2: Approaches to Information Security Implementation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information security DATE CREATED: 9/14/2016 10:29 AM DATE MODIFIED: 9/14/2016 10:29 AM 12. Using a methodology will usually have no effect on the probability of success. a. True b. False NURSEDOCS
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Nursedocs. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.