iss midterm

iss midterm

University

60 Qs

quiz-placeholder

Similar activities

CBT MOCK 3

CBT MOCK 3

University

60 Qs

EC19P83 - Introduction to IoT

EC19P83 - Introduction to IoT

University

65 Qs

Volume B

Volume B

University

63 Qs

NCM 110: NURSING INFORMATICS PRELIMS

NCM 110: NURSING INFORMATICS PRELIMS

University

64 Qs

IAS MIDTERM EXAMINATION

IAS MIDTERM EXAMINATION

University

60 Qs

INFO 232 / COMP 351 - CH 1

INFO 232 / COMP 351 - CH 1

University

57 Qs

HPC 411 (Applied Business Tools)

HPC 411 (Applied Business Tools)

University

61 Qs

FUBDATACOMS lect2

FUBDATACOMS lect2

University

61 Qs

iss midterm

iss midterm

Assessment

Quiz

Other

University

Medium

Created by

Mạnh nguyễn

Used 5+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk analysis is MOST useful when applied during which phase of the system development process?

Requirements definition

Implementation planning

Project identification

System construction

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which must bear the primary responsibility for determining the level of protection needed for information systems resources?

Senior Management

Seniors security analysts

System auditors

IS security specialists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes a covert timing channel?

Provides the timing trigger to activate a malicious program disguised as a legitimate function.

Used by a supervisor to monitor the productivity of a user without their knowledge

Allows one process to signal information to another by modulating its own use of system resources

Modulated to carry an unintended information signal that can only be detected by special, sensitive receivers.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is being considered as the most reliable kind of personal identification?

Finger print

Ticket Granting

Password

Token

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main responsibility of the information owner?

making the determination to decide what level of classification the information requires

periodically checking the validity and accuracy for all data in the information system

running regular backups

audit the users when they require access to the information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is called the access protection system that limits connections by calling back the number of a previously authorized location?

Sendback forward systems

Callback forward systems

Sendback system

Callback systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is called a type of access control where a central authority determines what subjects can have access to certain objects, based on the organizational security policy?

Rule-based access control

Non-discretionary Access Control

Mandatory Access Control

Discretionary Access Control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?