NAME

Question types


Start with


Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. IR
  2. CBA
  3. Operational
  4. (organizing, leading, controlling)
    ALL OF THE ABOVE
  5. appetite
  1. a A(n) _____ plan deals with the identification, classification, response, and recovery from an incident.
  2. b Effective management includes planning and _____.
  3. c The formal decision making process used when considering the economic feasibility of implementing information security controls and safeguards is called a(n) _____.
  4. d _____ controls address personnel security, physical security, and the protection of production inputs and outputs.
  5. e Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.

5 Multiple choice questions

  1. _____ defines stiffer penalties for prosecution of terrorists crimes.
  2. A _____ filtering firewall can react to an emergent event and update or create rules to deal with the event.
  3. According to Mark Pollitt, _____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.
  4. Management of classified data includes its storage and _____.
  5. A _____ site provides only rudimentary services and facilities.

5 True/False questions

  1. system administratorsThe concept of competitive _____ refers to falling behind the competition.

          

  2. distributed denial-of-serviceA _____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

          

  3. by accidentA _____ filtering firewall can react to an emergent event and update or create rules to deal with the event.

          

  4. MAC layer_____ addresses are sometimes called electronic serial numbers or hardware addresses.

          

  5. generalThe _____ security policy is an executive-level document that outlines the organization's approach and attitude towards information security and relates the strategic value of information security within the organization.

          

Create Set