Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
Individuals with the primary responsibility for administering the systems that house the information used by an organization perform the ________________ role.
|
Systems Administrator
|
|
__________ of information is the quality or state of being genuine or original.
|
Authenticity
|
|
__________ presents a comprehensive model for information security and is becoming the evaluation standard for the security of information systems.
|
NSTISSI No. 4011
|
|
The most successful kind of top-down approach involves a formal development strategy referred to as the _____________________ .
|
systems development life cycle
|
|
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.
|
CISO
|
|
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at all costs.
|
false
|
|
Compared to Web site defacement, vandalism from within a network is less malicious in intent and more public.
|
false
|
|
An overflow of water into a data center can cause direct damage to all or part of the information system.
|
True
|
|
Enforcement of copyright laws has been attempted through a number of technical security mechanisms, such as the using of digital watermarks and embedded code, the requiring of copyright codes, and even the intentional adding of bad sectors on software media.
|
True
|
|
The "shoulder looking" technique is used in public or semi-public settings, individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance.
|
false
|
|
There are generally two skill levels among hackers: expert and ____
|
Unskilled
|