
Security Strategies in Windows Chapters 1-2 Key Terms
Authored by John Doe
Other
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
55 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Administrative Control (Chapter 1)
Any person or program that attempts to interact with a computer information system in an unauthorized manner.
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
Any user (person or program) that possesses permission to access a resource.
The assurance that requested information is available to authorized users upon request.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attacker (Chapter 1)
Confidentiality, integrity, and availability, which are the goals of information security
Any user (person or program) that possesses permission to access a resource.
The assurance that requested information is available to authorized users upon request.
Any person or program that attempts to interact with a computer information system in an unauthorized manner.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Authorized User (Chapter 1)
Any user (person or program) that possesses permission to access a resource.
The assurance that requested information is available to authorized users upon request.
Confidentiality, integrity, and availability, which are the goals of information security
A collection of computer and network devices connected to one or more networks, generally for the purpose of fulfilling business functions. Also called IT Infrastructure.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Availability (Chapter 1)
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
Any person or program that attempts to interact with a computer information system in an unauthorized manner.
The assurance that requested information is available to authorized users upon request.
Any user (person or program) that possesses permission to access a resource.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
C-I-A Triad (Chapter 1)
The assurance that requested information is available to authorized users upon request.
The assurance that information can be accessed and viewed only by authorized users.
Confidentiality, integrity, and availability, which are the goals of information security
A control that repairs the effects of damage from an attack. Corrective controls include virus removal procedures, firewall table updates, and user authorization database updates.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Computer Environment (Chapter 1)
The assurance that information can be accessed and viewed only by authorized users.
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
A collection of computer and network devices connected to one or more networks, generally for the purpose of fulfilling business functions. Also called IT Infrastructure.
Any person or program that attempts to interact with a computer information system in an unauthorized manner.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Confidentiality (Chapter 1)
Confidentiality, integrity, and availability, which are the goals of information security
The assurance that information can be accessed and viewed only by authorized users.
Any user (person or program) that possesses permission to access a resource.
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?