• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Which of the following roles are responsible for assuring that third party suppliers and outsourced functions remain in security compliance?
Vendor managers
Who is responsible for assuring that systems are auditable and protected from excessive privileges?
Security administrators
Which of the following roles helps development teams with meeting security requirements?
Policymakers
Which of the following topics would not be part of a program in information security?
All of these would be part
A) laws and ethical practices
B) file access control
C) security architecture
The growing demand for InfoSec specialists is occurring predominantly in what types of organization?
A) government
B) corporations
and
C) not-for-profit foundations
The three objectives of information security are:
confidentiality
integrity
availability
The formal study of information security has accelerated primarily for what reason?
increasingly interconnected global networks
Sound information security policy:
is a balance between the cost of protecting information and the value of the information being protected
What is meant by the umbrella of information security?
IS incorporates many different pursuits and disciplines.
Which college curriculum is more appropriate for a career in information security?
business administration and computer information sciences
Careers in information security are booming because of which factors?
A) threats of cyber terrorism
B) government regulations
C) growth of the Internet
Information security is primarily a discipline to manage the behavior of:
people
Which of the following would make an individual seeking a career in information security more marketable?
A) CISSP certification
B) GIAC certification
and
C) evaluating virus protection software on a home computer
A career in information security:
has a better job frowth outlook than other areas within IT.
A good definition of information security should include:
security policies and procedures