True Or False

20 Questions  I  By Nicaj
This is a quiz to help me learn what i have been taught in my network security class.  this quiz will surely help me pass.

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  The value of information comes from the charateristics its possesses.
A.
B.
2.  People are not a threat to information security.
A.
B.
3.  Information security can be an absolute
A.
B.
4.  Waterfall is a type of sDlc Methodology.
A.
B.
5.  A data custodian works directly with data owners and is responsible. for the storage, maintenace, and protection of the information.
A.
B.
6.  Risk Management starts in the investigation phase.
A.
B.
7.  To achieve balance that is to operate an information system to the satisfaction of the user and the security professional the level of security must allow reasonable access, yet  protect against threats.
A.
B.
8.  A sniffer program shows all the data on an uswitched network segment by including unencrypted passwords and the data inside files.
A.
B.
9.   A firewall is a device that keeps certain kinds of Network traffic out of a Private network.
A.
B.
10.  Expert Hackers are extremetly talented individuals who usually have lost of time and energy to devote to attempting to break into other peoples Inforation systems.
A.
B.
11.  Which of the following functions does information security perform for an organization?
A.
B.
C.
D.
12.  Acts of ___ can lead to unauthorized real or virtual actions that enable information gatherers to enter pemises or systems they have not been authorized to enter
A.
B.
C.
D.
13.  There are generally two skill levels among hackers: expert and ____
A.
B.
C.
D.
14.  Deliberate software attacks are referred to as
A.
B.
C.
D.
15.  The most successful kind of top-down approach involves a formal development strategy referred to a(n)
A.
B.
C.
D.
16.  The ____ model consists of 5 general phases.
A.
B.
C.
D.
17.  In the ___ phase of the systems development life cycle, solution are evaluated, selected, and acquired through a make-or-buy process.
A.
B.
C.
D.
18.  Which of the following phases is the longest and most expensive phase of the system development life cyle?
A.
B.
C.
D.
19.  ___ is a project manager, who may be a departmental line manager or staf unit manager.
A.
B.
C.
D.
20.  ___ has the primary responsibility for the assessment, management, and implementation of information security in the organization.
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz