INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
0 view 0 purchase
Course
INF4831
Institution
INF4831
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS A+ GRADED. Buy Quality Materials!
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
Physical
____ security address the protection of individu...
inf4831 information security questions and answers
Written for
INF4831
All documents for this subject (31)
Seller
Follow
SUPERGRADES01
Reviews received
Content preview
INF4831 INFORMATION SECURITY QUESTIONS AND ANSWERS
A+ GRADED. Buy Quality Materials!
____ security addresses the issues necessary to protect the tangible items,
objects, or areas of an organization from unauthorized access and misuse.
Physical
____ security address the protection of individuals or groups authorized to
access an organization.
Personal
A computer is the ____ of an attack when it is used to conduct the attack.
Subject
____ of information is the quality or state of being genuine or original.
Authenticity
Security encompasses. In file hashing, a file is read by a special algorithm that
uses the value of the bits in the file to compute a single large number called a
____ value.
Hash
An information system is the entire set of ____, people, procedures, and networks
that make possible the use of information resources in the organization.
All of the Above (software,data,
hardware)
The most successful kind of top-down approach involves a formal development
strategy referred to as a ____.
Systems Development Life Cycle (SDLC)
The ____ is a methodology for the design and implementation of an information
system in an organization.
Systems Development Life Cycle (SDLC)
The ____ model consists of six general phases.
Waterfall
During the ____ phase, specific technologies are selected to support the
alternatives identified and evaluated in the logical design.
Physical Design
Which of the following phases is the longest and most expensive phase of the
systems development life cycle?
Maintenance & Change
Organizations are moving toward more ____-focused development approaches,
seeking to improve not only the functionality of the systems they have in place,
but consumer confidence in their product.
Security
Part of the logical design phase of the SecSDLC is planning for partial or
catastrophic loss. ____ dictates what steps are taken when an attack occurs.
Incident Response
.The ____ is the individual primarily responsible for the assessment,
management, and implementation of information security in the organization.
, Chief information security officer(CISO)
Which of the following is a valid type of data ownership?
All of the Above(Data owners,Data users,
Data custodians)
People with the primary responsibility for administering the systems that house
the information used by the organization perform the ____ role.
Systems Administrators
Which of the following functions does information security perform for an
organization.
All of the Above (Protecting the organization's ability to function,Enabling the safe
operation of applications implemented on the organization's IT systems,Protecting the
data the organization collects and uses.)
____ is an integrated system of software, encryption methodologies, and legal
agreements that can be used to support the entire information infrastructure of
an organization.
Public Key Infrastructure (PKI)
____ are software programs that hide their true nature, and reveal their designed
behavior only when activated.
Trojan Horses
As frustrating as viruses and worms are, perhaps more time and money is spent
on resolving virus ____.
Hoaxex
Complete loss of power for a moment is known as a ____.
Fault
Acts of ____ can lead to unauthorized real or virtual actions that enable
information gatherers to enter premises or systems they have not been
authorized to enter.
Trespass
There are generally two skill levels among hackers: expert and ____.
Novice
One form of online vandalism is ____ operations, which interfere with or disrupt
systems to protest the operations, policies, or actions of an organization or
government agency.
Hacktivist
____ is any technology that aids in gathering information about a person or
organization without their knowledge.
Spyware
In a ____ attack, the attacker sends a large number of connection or information
requests to a target.
denial-of-service
. A ____ is an attack in which a coordinated stream of requests is launched
against a target from many locations at the same time.
distributed denial-of-service
____ are machines that are directed remotely (usually by a transmitted command)
by the attacker to participate in an attack.
Zombies
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SUPERGRADES01. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.