0% found this document useful (0 votes)
156 views12 pages

Answer: True: Name: Clas S: Dat e

This document contains a true/false quiz about information security concepts covered in Chapter 1 of an information security textbook. It addresses early threats to computing, the definition of network security, the value of information, types of computer attacks, email viruses, possession of information, breaches of possession vs confidentiality, hardware as an attack target, the absoluteness of information security, balancing security and access, top-down vs bottom-up security approaches, using a methodology, phases of the systems development life cycle, legislation around computer crimes, anticipating attacks in system design, the roles of information security champions and data custodians, and aligning security roles with community goals.

Uploaded by

wejdan alharbi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views12 pages

Answer: True: Name: Clas S: Dat e

This document contains a true/false quiz about information security concepts covered in Chapter 1 of an information security textbook. It addresses early threats to computing, the definition of network security, the value of information, types of computer attacks, email viruses, possession of information, breaches of possession vs confidentiality, hardware as an attack target, the absoluteness of information security, balancing security and access, top-down vs bottom-up security approaches, using a methodology, phases of the systems development life cycle, legislation around computer crimes, anticipating attacks in system design, the roles of information security champions and data custodians, and aligning security roles with community goals.

Uploaded by

wejdan alharbi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Name  

 Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security


True / False

1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
the products of the systems, and sabotage.
  a. True
  b. Fals
e
ANSWER:  True

2. Network security focuses on the protection of the details of a particular operation or series of activities.
  a. True
  b. Fals
e
ANSWER:  Fals
e

3. The value of information comes from the characteristics it possesses.


  a. True
  b. Fals
e
ANSWER:  True

4. When a computer is the subject of an attack, it is the entity being attacked.


  a. True
  b. Fals
e
ANSWER:  Fals
e

5. An e-mail virus involves sending an e-mail message with a modified field.
  a. True
  b. Fals
e
ANSWER:  Fals
e

6. The possession of information is the quality or state of having value for some purpose or end.
  a. True
  b. Fals
e
ANSWER:  Fals
e

7. A breach of possession always results in a breach of confidentiality.


  a. True
  b. Fals
Cengage Learning Testing, Powered by Cognero Page 1
Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security

e
ANSWER:  Fals
e

8. Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
  a. True
  b. Fals
e
ANSWER:  Fals
e

9. Information security can be an absolute.


  a. True
  b. Fals
e
ANSWER:  Fals
e

10. To achieve balance — that is, to operate an information system that satisfies the user and the security professional —
the security level must allow reasonable access, yet protect against threats.
  a. True
  b. Fals
e
ANSWER:  True

11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
  a. True
  b. Fals
e
ANSWER:  Fals
e

12. Using a methodology increases the probability of success.


  a. True
  b. Fals
e
ANSWER:  True

13. The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
  a. True
  b. Fals
e
ANSWER:  Fals
e

14. The investigation phase of the SecSDLC begins with a directive from upper management.
Cengage Learning Testing, Powered by Cognero Page 2
Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security

  a. True
  b. Fals
e
ANSWER:  True

15. The physical design is the blueprint for the desired solution.


  a. True
  b. Fals
e
ANSWER:  Fals
e

16. Many states have implemented legislation making certain computer-related activities illegal.
  a. True
  b. Fals
e
ANSWER:  True

17. Applications systems developed within the framework of the traditional SDLC are designed to anticipate a software
attack that requires some degree of application reconstruction.
  a. True
  b. Fals
e
ANSWER:  Fals
e

18. A champion is a project manager, who may be a departmental line manager or staff unit manager, and has expertise in
project management and information security technical requirements.
  a. True
  b. Fals
e
ANSWER:  Fals
e

19. A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of
the information.
  a. True
  b. Fals
e
ANSWER:  True

20. The roles of information security professionals are almost always aligned with the goals and mission of the
information security community of interest.
  a. True
  b. Fals
e
Cengage Learning Testing, Powered by Cognero Page 3
Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security

ANSWER:  True

Modified True / False

21. MULTICS stands for Multiple Information and Computing Service. _________________________


ANSWER:  False - Multiplexed

22. According to the CNSS, networking is “the protection of information and its critical elements.”
_________________________
ANSWER:  False - information
security

23. Direct attacks originate from a compromised system or resource that is malfunctioning or working under the control of
a threat. _________________________
ANSWER:  False - Indirect

24. Information has redundancy when it is free from mistakes or errors and it has the value that the end user expects.
_________________________
ANSWER:  False - accuracy

25. When unauthorized individuals or systems can view information, confidentiality is breached.


_________________________
ANSWER:  True

26. Confidentiality ensures that only those with the rights and privileges to access information are able to do so.
_________________________
ANSWER:  True

27. Hardware is the physical technology that houses and executes the software, stores and transports the data, and
provides interfaces for the entry and removal of information from the system. _________________________
ANSWER:  True

28. Policies are detailed written instructions for accomplishing a specific task. _________________________
ANSWER:  False - Procedures

29. Information security can begin as a grassroots effort in which systems administrators attempt to improve the security
of their systems, often referred to as the bottom-up approach. _________________________
ANSWER:  True

30. Key end users should be assigned to a developmental team, known as the united application development team.
_________________________
ANSWER:  False - joint

31. Of the two approaches to information security implementation, the top-down approach has a higher probability of
success. _________________________
ANSWER:  True

Cengage Learning Testing, Powered by Cognero Page 4


Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security


32. The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an
information system. _________________________
ANSWER:  False - Systems

33. The Analysis phase of the SecSDLC begins the methodology initiated by a directive from upper management.
_________________________
ANSWER:  False - Investigation

34. Risk evaluation is the process of identifying, assessing, and evaluating the levels of risk facing the organization,
specifically the threats to the organization’s security and to the information stored and processed by the organization.
_________________________
ANSWER:  False - management

35. A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the
technical and nontechnical areas. _________________________
ANSWER:  True

Multiple Choice

36. __________ is a network project that preceded the Internet.


  a. NIS b. ARPANET
T
  c. FIPS d. DES
ANSWER:  b

37. The famous study entitled “Protection Analysis: Final Report” focused on a project undertaken by ARPA to
understand and detect __________ in operating systems security.
  a. Bugs b. Vulnerabilities
  c. Malware d. Maintenance hooks
ANSWER:  b

38. __________ was the first operating system to integrate security as its core functions.
  a. UNIX b. DOS
  c. MULTICS d. ARPANET
ANSWER:  c

39. __________ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization
from unauthorized access and misuse.
  a. Physica b. Personal
l
  c. Object d. Standard
ANSWER:  a

40. A server would experience a __________ attack when a hacker compromises it to acquire information from it from a
remote location using a network connection.
  a. indirect b. direct
Cengage Learning Testing, Powered by Cognero Page 5
Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security

  c. softwar d. hardware
e
ANSWER:  b

41. A computer is the __________ of an attack when it is used to conduct an attack against another computer.
  a. subjec b. object
t
  c. target d. facilitator
ANSWER:  a

42. __________ of information is the quality or state of being genuine or original.


  a. Authenticity b. Spoofing
  c. Confidentialit d. Authorization
y
ANSWER:  a

43. In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single
number called the __________ value.
  a. result b. smashing
  c. hash d. code
ANSWER:  c

44. __________ has become a widely accepted evaluation standard for training and education related to the security of
information systems.
  a. NIST SP 800- b. NSTISSI No. 4011
12
  c. IEEE 802.11(g) d. ISO 17788
ANSWER:  b

45. An information system is the entire set of __________, people, procedures, and networks that make possible the use of
information resources in the organization.
  a. software b. hardware
  c. data d. All of the above
ANSWER:  d

46. A methodology for the design and implementation of an information system that is a formal development strategy is
referred to as a __________.
  a. systems design b. development life project
  c. systems development life d. systems schema
cycle
ANSWER:  c

47. A variation of n SDLC that can be used to implement information security solutions in an organizations with little or
no formal security in place is the  __________.
  a. SecDSLC b. SecSDLC

Cengage Learning Testing, Powered by Cognero Page 6


Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security

  c. LCSecD d. CLSecD
ANSWER:  b

48. A type of SDLC where each phase has results that flow into the next phase is called the  __________ model.
  a. pitfall b. SA&D
  c. waterfal d. Method 7
l
ANSWER:  c

49. During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in
the prior phases.
  a. investigation b. implementation
  c. analysis d. physical design
ANSWER:  d

50. Which of the following phases is often considered the longest and most expensive phase of the systems development
life cycle?
  a. investigation b. logical design
  c. implementatio d. maintenance and change
n
ANSWER:  d

51. Organizations are moving toward more __________-focused development approaches, seeking to improve not only
the functionality of the systems they have in place, but consumer confidence in their product.
  a. security b. reliability
  c. accessibilit d. availability
y
ANSWER:  a

52. Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. ____ dictates what
immediate steps are taken when an attack occurs.
  a. Continuity b. Incident response
planning
  c. Disaster recovery d. Security response
ANSWER:  b

53. The ____ is the individual primarily responsible for the assessment, management, and implementation of information
security in the organization.
  a. ISO b. CIO
  c. CIS d. CTO
O
ANSWER:  c

54. Which of the following is a valid type of role when it comes to data ownership?
  a. Data owners b. Data custodians

Cengage Learning Testing, Powered by Cognero Page 7


Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security

  c. Data users d. All of the above


ANSWER:  d

55. People with the primary responsibility for administering the systems that house the information used by the
organization perform the ____ role.
  a. Security policy b. Security professionals
developers
  c. System administrators d. End users
ANSWER:  c

Completion

56. The history of information security begins with the concept of ____________________ security.


ANSWER:  computer

57. During the early years, information security was a straightforward process composed predominantly of
____________________ security and simple document classification schemes.
ANSWER:  physica
l

58. During the ____________________ War, many mainframes were brought online to accomplish more complex and
sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than
mailing magnetic tapes between computer centers.
ANSWER:  Cold

59. The Internet brought ____________________ to virtually all computers that could reach a phone line or an Internet-
connected local area network.
ANSWER:  connectivit
y

60. The CNSS model of information security evolved from a concept developed by the computer security industry known
as the ____________________ triangle.
ANSWER:  CIA
C.I.A.
Confidentiality, Integrity, and Availability

61. A computer is the ____________________ of an attack when it is the entity being targeted.
ANSWER:  object

62. ____________________ enables authorized users — persons or computer systems — to access information without
interference or obstruction and to receive it in the required format.
ANSWER:  Availability

63. ____________________ of information is the quality or state of being genuine or original, rather than a reproduction
or fabrication.
ANSWER:  Authenticity

Cengage Learning Testing, Powered by Cognero Page 8


Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security


64. Information has ____________________ when it is whole, complete, and uncorrupted.
ANSWER:  integrity

65. In an organization, the value of ____________________ of information is especially high when it involves personal
information about employees, customers, or patients.
ANSWER:  confidentiality

66. The ____________________ of information is the quality or state of ownership or control of some object or item.
ANSWER:  possession

67. The ____________________ component of the IS comprises applications, operating systems, and assorted command
utilities.
ANSWER:  softwar
e

68. Software is often created under the constraints of ____________________ management, placing limits on time, cost,
and manpower.
ANSWER:  project

69. A frequently overlooked component of an information system, ____________________ are the written instructions
for accomplishing a specific task.
ANSWER:  procedures

70. In the ____________________ approach, the project is initiated by upper-level managers who issue policy,
procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action.
ANSWER:  top-down

71. A(n) ____________________ is a formal approach to solving a problem by means of a structured sequence of


procedures.
ANSWER:  methodology

72. The ____________________ phase consists primarily of assessments of the organization, its current systems, and its
capability to support the proposed systems.
ANSWER:  analysis

73. A(n) ____________________ information security policy outlines the implementation of a security program within
the organization.
ANSWER:  enterpris
e

74. The senior technology officer is typically the chief ____________________ officer.


ANSWER:  information

75. A(n) ____________________ is a group of individuals who are united by similar interests or values within an
organization and who share a common goal of helping the organization to meet its objectives.
ANSWER:  community of
interest

Cengage Learning Testing, Powered by Cognero Page 9


Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security


Essay

76. Describe the multiple types of security systems present in many organizations.


ANSWER A successful organization should have the following multiple layers of security in place
:   to protect its operations, including physical, personnel, operations, communications,
network, and information.

Physical security, to protect physical items, objects, or areas from unauthorized access
and misuse

Personnel security, to protect the individual or group of individuals who are authorized
to access the organization and its operations

Operations security, to protect the details of a particular operation or series of activities

Communications security, to protect communications media, technology, and content

Network security, to protect networking components, connections, and contents

Information security, to protect the confidentiality, integrity and availability of


information assets, whether in storage, processing or transmission. It is achieved via
the application of policy, education, training and awareness, and technology.

77. List and describe the six phases of the security systems development life cycle.
ANSWER Investigation
:   The investigation phase of the SecSDLC begins with a directive from upper
management, dictating the process, outcomes, and goals of the project, as well as its
budget and other constraints. Frequently, this phase begins with an enterprise
information security policy, which outlines the implementation of a security program
within the organization. Teams of responsible managers, employees, and contractors
are organized; problems are analyzed; and the scope of the project, as well as specific
goals and objectives, and any additional constraints not covered in the program policy,
are defined. Finally, an organizational feasibility analysis is performed to determine
whether the organization has the resources and commitment necessary to conduct a
successful security analysis and design.

Analysis
In the analysis phase, the documents from the investigation phase are studied. The
development team conducts a preliminary analysis of existing security policies or
programs, along with that of documented current threats and associated controls. This
phase also includes an analysis of relevant legal issues that could affect the design of
the security solution. Increasingly, privacy laws have become a major consideration
when making decisions about information systems that manage personal information.
Recently, many states have implemented legislation making certain computer-related
activities illegal. A detailed understanding of these issues is vital. The risk management
task also begins in this stage. Risk management is the process of identifying,
assessing, and evaluating the levels of risk facing the organization, specifically the
threats to the organization’s security and to the information stored and processed by the
organization.

Cengage Learning Testing, Powered by Cognero Page 10


Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security

Logical Design
The logical design phase creates and develops the blueprints for information security,
and examines and implements key policies that influence later decisions. Also at this
stage, the team plans the incident response actions to be taken in the event of partial or
catastrophic loss. The planning answers the following questions:
- Continuity planning: How will business continue in the event of a loss?
- Incident response:What steps are taken when an attack occurs?
- Disaster recovery:What must be done to recover information and vital systems
immediately after a disastrous event?
Next, a feasibility analysis determines whether or not the project should be continued
or be outsourced.

Physical Design
In the physical design phase, the information security technology needed to support the
blueprint outlined in the logical design is evaluated, alternative solutions generated,
and a final design agreed upon. The information security blueprint may be revisited to
keep it in line with the changes needed when the physical design is completed. Criteria
for determining the definition of successful solutions are also prepared during this
phase. Included at this time are the designs for physical security measures to support
the proposed technological solutions. At the end of this phase, a feasibility study
should determine the readiness of the organization for the proposed project, and then
the champion and sponsors are presented with the design. At this time, all parties
involved have a chance to approve the project before implementation begins.

Implementation
The implementation phase in of SecSDLC is also similar to that of the traditional
SDLC. The security solutions are acquired (made or bought), tested, implemented, and
tested again. Personnel issues are evaluated, and specific training and education
programs conducted. Finally, the entire tested package is presented to upper
management for final approval.

Maintenance and Change


The maintenance and change phase, though last, is perhaps most important, given the
current ever-changing threat environment. Today’s information security systems need
constant monitoring, testing,modification, updating, and repairing. Traditional
applications systems developed within the framework of the traditional SDLC are not
designed to anticipate a vicious attack that would require some degree of application
reconstruction. In information security, the battle for stable, reliable systems is a
defensive one. Often, repairing damage and restoring information is a constant effort
against an unseen adversary. As new threats emerge and old threats evolve, the
information security profile of an organization requires constant adaptation to prevent
threats from successfully penetrating sensitive data. This constant vigilance and
security can be compared to that of a fortress where threats from outside as well as
from within must be constantly monitored and checked with continuously new and
more innovative technologies.

78. Outline types of data ownership and their respective responsibilities.


ANSWER Data owners: Those responsible for the security and use of a particular set of
:   information. They are usually members of senior management and could be CIOs. The
data owners usually determine the level of data classification associated with the data,
Cengage Learning Testing, Powered by Cognero Page 11
Name    Clas    Dat  
: s: e:

Chapter 01: Introduction to Information Security

as well as the changes to that classification required by organizational change.

Data custodians: Working directly with data owners, data custodians are responsible
for the storage, maintenance, and protection of the information. The duties of a data
custodian often include overseeing data storage and backups, implementing the specific
procedures and policies laid out in the security policies and plans, and reporting to the
data owner.

Data users: End users who work with the information to perform their daily jobs
supporting the mission of the organization. Data users are included as individuals with
an information security role.

Cengage Learning Testing, Powered by Cognero Page 12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy