Question types

Start with

Question limit

of 100 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. data classification scheme
  2. DR
  3. Computer Fraud and Abuse Act
  4. CBA
  5. waterfall
  1. a Many corporations use a _____ to help secure the confidentiality and integrity of information.
  2. b _____ plans usually include all preparations fro the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the floodwaters recede.
  3. c The formal decision making process used when considering the economic feasibility of implementing information security controls and safeguards is called a(n) _____.
  4. d The National Information Infrastructure Protection Act of 1996 modified which Act?
  5. e The _____ model consists of six general phases.

5 Multiple choice questions

  1. The actions an organization can and perhaps should take while an incident is in progress should be specified in a document called the _____ plan.
  2. The _____ Portability and Accountability Act of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
  3. _____ controls address personnel security, physical security, and the protection of production inputs and outputs.
  4. Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. _____ dictates what steps are taken when an attack occurs.
  5. In most common implementation models, the content filter has two components: _____

5 True/False questions

  1. Packet-filtering_____ firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information.


  2. distributed denial-of-service"4-1-9" fraud is an example of a _____ attack.


  3. PKIICMP uses port _____ to request a response to a query and can be the first indicator of a malicious attack.


  4. (United States, Germany, Japan)
    An information system is the entire set of _____, people, procedures, and networks that make possible the use of information resources in the organization.


  5. coldWeb hosting services are usually arranged with an agreement providing minimum service levels known as a(n) _____.