Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | May 2017 |
Last Sign in: | 189 Weeks Ago, 2 Days Ago |
Questions Answered: | 27237 |
Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
Infomation Security syst wk4assign.copy.docxÂ
Question 1
What is a type of law that represents all of the laws that apply to a citizen (or subject) of a jurisdiction?
Question 2
direct how issues should be addressed and technologies used.
Question 3
A risk management strategy calls on information security professionals to know their organization's.
Question 4
community of interest should have the best understanding of threats and attacks and often takes a leadership role in addressing risks.
Question 5
are frequently codified as standards and procedures to be used when configuring or maintaining systems.
Question 6
When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow a(n) ____ approach.
|
A. |
trickle down |
|
B. |
top-down |
|
C. |
executive led |
|
D. |
bottom-up |
Question 7
True or False: The National Security Agency (NSA) is responsible for the security of all national critical infrastructures.
True
False
Â
Question 8
System-specific policies can be organized into two general groups: and .
Question 9
Ownership or control of information is called the characteristic of _____.
|
A. |
authenticity |
|
B. |
confidentiality |
|
C. |
possession |
|
D. |
integrity |
Question 10
True or False: According to Chinese General Sun Tzu (as quoted in the textbook), you should know the enemy and know yourself.
True
False
Question 11
A(n)  addresses specific areas of technology, requires frequent updates, and contains a statement on the organization’s position on a specific issue.
Question 12
True or False: The Federal Bureau of Investigation (FBI) is the federal agency responsible for signal intelligence and information system security of classified systems.
True
False
Question 13
 What does ARPA stand for?
Question 14
The  community of interest must ensure sufficient resources are allocated to the risk management process.
Question 15
True or False: If information has a state of being genuine or original and is not a fabrication, it has the characteristic of authenticity.
True
False
Question 16
The second major undertaking involved in risk management, after risk identification, is
Question 17
For information security purposes, Â are the systems that use, store, and transmit information.
Â
Question 18
When individuals are assigned security labels for access to categories of information, they have acquired a(n)
Question 19
____ security addresses the protection of individuals or groups authorized to access an organization.
|
A. |
Physical |
|
B. |
Public |
|
C. |
Personal |
|
D. |
Personnel |
 Â
Question 20
Risk identification is performed within a larger process of identifying and justifying risk controls, which is called
 Â
Question 21
What is a type of law that addresses violations harmful to society and that is enforced by prosecution by the state?
 Â
Question 22
are detailed statements of what must be done to comply with policy.
Â
Question 23
True or False: The traditional system component of software can be broken into two components when viewed from an information security perspective: operating systems and security components.
True
False
Â
Question 24
True or False: Hardware networking components can be broken down into two subgroups when viewed from an information security perspective: Intranet components and Internet or DMZ components.
True
False
Â
Question 25
True or False: The National Security Agency (NSA) is the federal agency responsible for signal intelligence and information system security of classified systems.
True
False
Â
Â
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll