• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
Individuals with the primary responsibility for administering the systems that house the information used by an organization perform the ________________ role.
Systems Administrator
__________ of information is the quality or state of being genuine or original.
Authenticity
__________ presents a comprehensive model for information security and is becoming the evaluation standard for the security of information systems.
NSTISSI No. 4011
The most successful kind of top-down approach involves a formal development strategy referred to as the _____________________ .
systems development life cycle
The ____ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization.
CISO
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at all costs.
false
Compared to Web site defacement, vandalism from within a network is less malicious in intent and more public.
false
An overflow of water into a data center can cause direct damage to all or part of the information system.
True
Enforcement of copyright laws has been attempted through a number of technical security mechanisms, such as the using of digital watermarks and embedded code, the requiring of copyright codes, and even the intentional adding of bad sectors on software media.
True
The "shoulder looking" technique is used in public or semi-public settings, individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance.
false
There are generally two skill levels among hackers: expert and ____
Unskilled