IAS_REVIEWER

IAS_REVIEWER

University

85 Qs

quiz-placeholder

Similar activities

CompTIA A+ Core 1 Practice Test A

CompTIA A+ Core 1 Practice Test A

University

80 Qs

Dynamic Programming

Dynamic Programming

University

82 Qs

Final Exam Prep Review

Final Exam Prep Review

University

87 Qs

FINALS Reviewer -CPE10 (Mixed Signals and Sensors)

FINALS Reviewer -CPE10 (Mixed Signals and Sensors)

University

90 Qs

CompTIA A+ Core 2 Practice Test A

CompTIA A+ Core 2 Practice Test A

University

80 Qs

ITPC12 Reviewer ch1

ITPC12 Reviewer ch1

University

85 Qs

Network#1

Network#1

12th Grade - University

90 Qs

Trees and Graphs

Trees and Graphs

University

85 Qs

IAS_REVIEWER

IAS_REVIEWER

Assessment

Quiz

Computers

University

Easy

Created by

Leomord Brisbane

Used 3+ times

FREE Resource

85 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information security

a “well-informed sense of assurance that the information risks and controls are in balance.”

“the quality or state of being secure – to be free from danger”

relates to the actual input and output processes of the system. It focuses on how data is entered into a system, verified, processed and displayed as output

The branch of philosophy that considers nature, criteria, sources, logic, and the validity of moral judgment.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security

Feasibility analysis to determine whether project should be continued or outsourced

Components evaluated on make-or-buy decision

“the quality or state of being secure – to be free from danger”

A hacker who intentionally removes or bypasses software copyright protection designed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Laws

oversees the people, processes and technologies within a company’s IT organization to ensure they deliver outcomes that support the goals of the business

The process of identifying risk, assessing its relative magnitude, and taking steps to reduce it to an acceptable level

Main factor is business need

Rules that mandate or prohibit certain behavior and are enforced by the state.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ethics

The application of controls that reduce the risks to an organization’s information assets to an acceptable leveL

The branch of philosophy that considers nature, criteria, sources, logic, and the validity of moral judgment.

Necessary data support and structures identified

“the quality or state of being secure – to be free from danger”

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cracker

The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization’s security efforts.

A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use

is software used by a company to manage key parts of operations, including accounting and resource management.

Also known as a security program policy, general security policy, IT security policy, high-level InfoSec policy, or simply an InfoSec policy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phreaker

a conceptual abstract design. You do not deal with the physical implementation details yet; you deal only with defining the types of information that you need.

Also known as a security program policy, general security policy, IT security policy, high-level InfoSec policy, or simply an InfoSec policy

Feasibility analysis to determine whether project should be continued or outsourced

a hacker who manipulates the public telephone system to make free calls or disrupt services.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is not a definition of Logical design

a conceptual abstract design. You do not deal with the physical implementation details yet; you deal only with defining the types of information that you need.

Creates and develops blueprints for information security

The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization’s security efforts.

Feasibility analysis to determine whether project should be continued or outsourced

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?