
iss midterm

Quiz
•
Other
•
University
•
Medium
Mạnh nguyễn
Used 5+ times
FREE Resource
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Risk analysis is MOST useful when applied during which phase of the system development process?
Requirements definition
Implementation planning
Project identification
System construction
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
Senior Management
Seniors security analysts
System auditors
IS security specialists
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes a covert timing channel?
Provides the timing trigger to activate a malicious program disguised as a legitimate function.
Used by a supervisor to monitor the productivity of a user without their knowledge
Allows one process to signal information to another by modulating its own use of system resources
Modulated to carry an unintended information signal that can only be detected by special, sensitive receivers.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is being considered as the most reliable kind of personal identification?
Finger print
Ticket Granting
Password
Token
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main responsibility of the information owner?
making the determination to decide what level of classification the information requires
periodically checking the validity and accuracy for all data in the information system
running regular backups
audit the users when they require access to the information
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called the access protection system that limits connections by calling back the number of a previously authorized location?
Sendback forward systems
Callback forward systems
Sendback system
Callback systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called a type of access control where a central authority determines what subjects can have access to certain objects, based on the organizational security policy?
Rule-based access control
Non-discretionary Access Control
Mandatory Access Control
Discretionary Access Control
Create a free account and access millions of resources
Similar Resources on Wayground
58 questions
Operations management review 2

Quiz
•
University
60 questions
HAC-101 Midterm Quiz

Quiz
•
University
65 questions
AWS Cloud Practitioner 02

Quiz
•
University
60 questions
Final Examination in Quality Service Management

Quiz
•
University
61 questions
HPC 411 (Applied Business Tools)

Quiz
•
University
60 questions
ocean101 chapter 1 learning objectives study

Quiz
•
University
62 questions
QCM 1 - SF ADM

Quiz
•
University
65 questions
IT Review Quiz

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade