100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Test Bank for Principles of Information Security, 7th Edition Module 1-12 | A+ CA$18.75   Add to cart

Exam (elaborations)

Test Bank for Principles of Information Security, 7th Edition Module 1-12 | A+

 16 views  0 purchase
  • Course
  • Institution
  • Book

Test Bank for Principles of Information Security, 7th Edition Module 1-12 | A+ Module 1 Introduction to Information Security True / False 1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against the products of the systems, and ...

[Show more]

Preview 4 out of 402  pages

  • March 13, 2024
  • 402
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Name: Class: Date:




Full Test Bank for Principles of Information Security, 7th
Edition Module 1-12

Module 1 Introduction to Information Security
True / False

1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
the products of the systems, and sabotage.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
REFERENCES: H1: Introduction to Information Security
p. 2
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/2/2017 3:48 PM

2. Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: H1: What is Security?
p. 8
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 1:54 PM

3. When a computer is the subject of an attack, it is the entity being attacked.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 1

,Name: Class: Date:


POINTS: 1
REFERENCES: p. 10
H1: What is Security?
H2: Key Information Security Concepts
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

4. The value of information comes from the characteristics it possesses.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: p. 11
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

5. E-mail spoofing involves sending an e-mail message with a harmful attachment.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: p. 13
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 2:02 PM

6. The possession of information is the quality or state of having value for some purpose or end.
a. True
b. False
ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 2

,Name: Class: Date:


POINTS: 1
REFERENCES: p. 13
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

7. A breach of possession may not always result in a breach of confidentiality.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: p. 14
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM

8. Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: p. 16
H1: Components of An Information System
H2: Data
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM

9. Information security can be an absolute.
a. True
b. False
ANSWER: False

Copyright Cengage Learning. Powered by Cognero. Page 3

, Name: Class: Date:


POINTS: 1
REFERENCES: p. 17
H1: Security and The Organization
H2: Balancing Information Security and Access
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

10. To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the
security level must allow reasonable access, yet protect against threats.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: p. 17
H1: Security and The Organization
H2: Balancing Information Security and Access
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 5:20 PM

11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: p. 18
H1: Security and The Organization
H2: Approaches to Information Security Implementation
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM

12. Using a methodology will usually have no effect on the probability of success.
a. True
b. False

Copyright Cengage Learning. Powered by Cognero. Page 4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TestsBanks. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$18.75. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62890 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


CA$18.75
  • (0)
  Add to cart