Search Header Logo

IIS Trial Test

Authored by Hiền Đào

Science

University

60 Questions

Used 4+ times

IIS Trial Test
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk analysis is MOST useful when applied during which phase of the system development process?

Requirements definition

Implementation planning

Project identification

System construction

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which must bear the primary responsibility for determining the level of protection needed for information systems resources?

Senior Management

Seniors security analysts

System auditors

IS security specialists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes a covert timing channel?

Provides the timing trigger to activate a malicious program disguised as a legitimate function.

Used by a supervisor to monitor the productivity of a user without their knowledge.

Allows one process to signal information to another by modulating its own use of system resources.

Modulated to carry an unintended information signal that can only be detected by special, sensitive receivers.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is being considered as the most reliable kind of personal identification?

Finger print

Ticket Granting

Password

Token

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main responsibility of the information owner?

making the determination to decide what level of classification the information requires

periodically checking the validity and accuracy for all data in the information system

running regular backups

audit the users when they require access to the information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is called the access protection system that limits connections by calling back the number of a previously authorized location?

Sendback forward systems

Callback forward systems

Sendback system

Callback systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is called a type of access control where a central authority determines what subjects can have access to certain objects, based on the organizational security policy?

Rule-based access control

Non-discretionary Access Control

Mandatory Access Control

Discretionary Access Control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?