The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 313 Weeks Ago, 6 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
I need help with my IS211 course. Â Attached is the information.
QUESTION 1
True or False: If information has a state of being genuine or original and is not a fabrication, it has the characteristic of authenticity.
 True
 False
QUESTION 2
The second major undertaking involved in risk management, after risk identification, is .
QUESTION 3
What does ARPA stand for?Â
QUESTION 4
The  community of interest must ensure sufficient resources are allocated to the risk management process.
QUESTION 5
Risk identification is performed within a larger process of identifying and justifying risk controls, which is called .
QUESTION 6
True or False: The National Security Agency (NSA) is the federal agency responsible for signal intelligence and information system security of classified systems.
 True
 False
QUESTION 7
 are frequently codified as standards and procedures to be used when configuring or maintaining systems.
QUESTION 8
When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow a(n) ____ approach.
|
|
A. |
executive led |
|
|
B. |
bottom-up |
|
|
C. |
trickle down |
|
|
D. |
top-down |
QUESTION 9
 are detailed statements of what must be done to comply with policy.
QUESTION 10
True or False: The traditional system component of software can be broken into two components when viewed from an information security perspective: operating systems and security components.
 True
 False
QUESTION 11
Ownership or control of information is called the characteristic of _____.
|
|
A. |
authenticity |
|
|
B. |
confidentiality |
|
|
C. |
possession |
|
|
D. |
integrity |
QUESTION 12
True or False: The National Security Agency (NSA) is responsible for the security of all national critical infrastructures.
 True
 False
QUESTION 13
A risk management strategy calls on information security professionals to know their organization's .
QUESTION 14
When individuals are assigned security labels for access to categories of information, they have acquired a(n)Â .
QUESTION 15
What is a type of law that represents all of the laws that apply to a citizen (or subject) of a jurisdiction?Â
QUESTION 16
For information security purposes,  are the systems that use, store, and transmit information.
QUESTION 17
A(n)  addresses specific areas of technology, requires frequent updates, and contains a statement on the organization’s position on a specific issue.
QUESTION 18
What is a type of law that addresses violations harmful to society and that is enforced by prosecution by the state?Â
QUESTION 19
The  community of interest should have the best understanding of threats and attacks and often takes a leadership role in addressing risks.
QUESTION 20
 direct how issues should be addressed and technologies used.
QUESTION 21
True or False: Hardware networking components can be broken down into two subgroups when viewed from an information security perspective: Intranet components and Internet or DMZ components.
 True
 False
QUESTION 22
True or False: According to Chinese General Sun Tzu (as quoted in the textbook), you should know the enemy and know yourself.
 True
 False
QUESTION 23
System-specific policies can be organized into two general groups:  and .
QUESTION 24
____ security addresses the protection of individuals or groups authorized to access an organization.
|
|
A. |
Personal |
|
|
B. |
Public |
|
|
C. |
Personnel |
|
|
D. |
Physical |
QUESTION 25
True or False: The Federal Bureau of Investigation (FBI) is the federal agency responsible for signal intelligence and information system security of classified systems.
 True
 False
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly