Information Security Session 1 Assessment

9 Questions | Total Attempts: 991

SettingsSettingsSettings
Information Security Session 1 Assessment - Quiz

This tests your knowledge on information security from session 1.


Questions and Answers
  • 1. 
    A short-coming of the top-down approach to security information implementation is that it has weak upper-management support.
    • A. 

      True

    • B. 

      False

  • 2. 
    The security systems development life cycle is based on a variation of the systems development life cycle.
    • A. 

      True

    • B. 

      False

  • 3. 
    __________________ is the last and perhaps the most important phase of the security systems development life cycle.
    • A. 

      Investigation

    • B. 

      Physical design

    • C. 

      Maintenance and change

    • D. 

      Implementation

    • E. 

      Analysis

  • 4. 
    The senior technology officer in an organization is typically the ____________________.
    • A. 

      Chief Executive Officer

    • B. 

      Chief Information Security Officer

    • C. 

      Chief Information Officer

  • 5. 
    The three types of data ownership include: data owners, data custodians, and data users.
    • A. 

      True

    • B. 

      False

  • 6. 
    What is a weakness or fault in a system?
    • A. 

      Vulnerability

    • B. 

      Direct attack

    • C. 

      Confidentiality

  • 7. 
    What do we call a single instance of being open to damage?
    • A. 

      Object of an attack

    • B. 

      Maintenance and Change

    • C. 

      vulnerable

  • 8. 
    Ownership or control of information is called the characteristic of?
    • A. 

      Authenticity

    • B. 

      Possession

    • C. 

      Information System

  • 9. 
    The characteristic of information that deals with preventing disclosure is ______.
    • A. 

      Personal Security

    • B. 

      Confidentiality

    • C. 

      Communications Security

Back to Top Back to top