
iss midterm

Quiz
•
Other
•
University
•
Medium
Mạnh nguyễn
Used 5+ times
FREE Resource
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Risk analysis is MOST useful when applied during which phase of the system development process?
Requirements definition
Implementation planning
Project identification
System construction
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
Senior Management
Seniors security analysts
System auditors
IS security specialists
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes a covert timing channel?
Provides the timing trigger to activate a malicious program disguised as a legitimate function.
Used by a supervisor to monitor the productivity of a user without their knowledge
Allows one process to signal information to another by modulating its own use of system resources
Modulated to carry an unintended information signal that can only be detected by special, sensitive receivers.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is being considered as the most reliable kind of personal identification?
Finger print
Ticket Granting
Password
Token
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main responsibility of the information owner?
making the determination to decide what level of classification the information requires
periodically checking the validity and accuracy for all data in the information system
running regular backups
audit the users when they require access to the information
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called the access protection system that limits connections by calling back the number of a previously authorized location?
Sendback forward systems
Callback forward systems
Sendback system
Callback systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called a type of access control where a central authority determines what subjects can have access to certain objects, based on the organizational security policy?
Rule-based access control
Non-discretionary Access Control
Mandatory Access Control
Discretionary Access Control
Create a free account and access millions of resources
Similar Resources on Wayground
55 questions
акт 251-300

Quiz
•
University
57 questions
Level 2 Health & Safety - Legislation [Long]

Quiz
•
12th Grade - University
55 questions
Architecture 1

Quiz
•
University
56 questions
Computer ARCH Quiz

Quiz
•
University
60 questions
120-180

Quiz
•
University
55 questions
N202 - U3 Practice

Quiz
•
University
56 questions
MGT Quiz 1 Practice (Selected Qs)

Quiz
•
University
62 questions
Network Media

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Other
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University