Information Assurance and Security 2

Information Assurance and Security 2
(PreQ1&Q2)
(PreLabQ1&Q2)
(PXam)
(MidQ1, Q2)
(MidLQ1, LQ2)
(MLab)
(FinQ1, Q2)
(FinLQ1, LQ2)




Question text

Feeling confident about their organization's security level: When information security community members participated in the Cybersecurity Trends Report, they were asked how positive they felt about their security stance.

Select one:
 

Question text

The  Layer describes the notion that data ought to be secured while in motion.

Question text

The  Layer describes the notion that the physical access to any system, server, computer, data center, or another physical object storing confidential information has to be constrained to business ought-to-know.

Question text

The requirements for applications that are connected to will differ from those for applications without such interconnection.

Question text

Match the term/details to complete each statement.

Over the last decade, we’ve seen a _________________ between cybersecurity and information security, as these previously siloed positions have come together. 

 

In some scenarios, an __________________ would help a cybersecurity professional prioritize data protection — and then the cybersecurity professional would determine the best course of action for the data protection.

 

Both individuals need to know what data is most critical to the organization so they can focus on placing the right ____________________ and monitoring controls on that data.

 

 Cybersecurity professionals traditionally understand the technology, firewalls, and intrusion protection systems needed, but weren’t necessarily brought up in the ___________________.

 

If your data is stored physically or digitally, you need to be sure you have all the right ____________________ in place to prevent unauthorized individuals from gaining access.


Question text

Match the term/details to complete each statement.

In some scenarios, an __________________ would help a cybersecurity professional prioritize data protection — and then the cybersecurity professional would determine the best course of action for the data protection.

 

Over the last decade, we’ve seen a _________________ between cybersecurity and information security, as these previously siloed positions have come together. 

 

If your data is stored physically or digitally, you need to be sure you have all the right ____________________ in place to prevent unauthorized individuals from gaining access.

 

 Cybersecurity professionals traditionally understand the technology, firewalls, and intrusion protection systems needed, but weren’t necessarily brought up in the ___________________.

 

Both individuals need to know what data is most critical to the organization so they can focus on placing the right ____________________ and monitoring controls on that data.

 

Question text

 is another way of saying “data security.”

Question text

Info security is concerned with making sure data in any form is kept secure and is a bit broader than 

Question text

The process to protect that data requires more advanced .

Question text

First Reason why investing in information security is significant

Question text

 is all about protecting data that is found in electronic form (such as computers, servers, networks, mobile devices, etc.) from being compromised or attacked.

Question text

Info security is concerned with making sure data in any form is kept secure and is a bit broader than 

Question text

The process to protect that data requires more advanced .

Question text

 is all about protecting data that is found in electronic form (such as computers, servers, networks, mobile devices, etc.) from being compromised or attacked.

Question text

 is another way of saying “data security.”

Question text

The weight given to each of the three major requirements describing needs for information security—confidentiality, integrity, and availability—depends strongly on .

Question text

 that must be restored within an hour after disruption represents, and requires, a more demanding set of policies and controls than does a similar system that need not be restored for two to three days. 

Question text

 is a requirement whose purpose is to keep sensitive information from being disclosed to unauthorized recipients. 

Question text

Early disclosure may jeopardize  advantage, but disclosure just before the intended announcement may be insignificant.

Question text

With  attacks, for example, even legitimate and honest users of an owner mechanism can be tricked into disclosing secret data. 

Question text

The weight given to each of the three major requirements describing needs for information security—confidentiality, integrity, and availability—depends strongly on .

Question text

With  attacks, for example, even legitimate and honest users of an owner mechanism can be tricked into disclosing secret data. 

Question text

Early disclosure may jeopardize  advantage, but disclosure just before the intended announcement may be insignificant.

Question text

 is a requirement whose purpose is to keep sensitive information from being disclosed to unauthorized recipients. 

Question text

 that must be restored within an hour after disruption represents, and requires, a more demanding set of policies and controls than does a similar system that need not be restored for two to three days. 

Question text

 :controlling who gets to read information.

Question text

: assuring that authorized users have continued access to information and resources.

Question text

The requirements for applications that are connected to will differ from those for applications without such interconnection.

Question text

  :assuring that information and programs are changed only in a specified and authorized manner.

Question text

For a , the chief concern may be ensuring the confidentiality of classified information, whereas a funds transfer system may require strong integrity controls. 

Question text

Fifth Reason why investing in information security is significant

Question text

Third Reason why investing in information security is significant

Question text

What jobs in information security is this?

Salary: $139,000
Responsibilities: Information systems managers work toward ensuring a company's tech is capable of meeting their IT goals.

Question text

What jobs in information security is this?

Salary: $95,510
Responsibilities: Information security analysts monitor their companies' computer networks to combat hackers and compile reports of security breaches.

Question text

First Reason why investing in information security is significant

Question text

Fourth Reason why investing in information security is significant

Question text

Second Reason why investing in information security is significant

Question text

What jobs in information security is this?

Salary: $104,000
Responsibilities: Create an in-office network for a small business or a cloud infrastructure for a business with corporate locations in cities on opposite coasts.

Question text

The need for skilled workers and allocation of funds for security within their budget: Companies are making the effort to allocate more funds in their budgets for security.

Select one:
 

Question text

What jobs in information security is this?

Salary: $103,560
Responsibilities: Software developers can be tasked with a wide range of responsibilities that may include designing parts of computer programs and applications and designing how those pieces work together.

Question text

Feeling confident about their organization's security level: When information security community members participated in the Cybersecurity Trends Report, they were asked how positive they felt about their security stance.

Select one:
 

Question text

Disruptions in their day-to-day business: Time is money.

Select one:
 

Question text

First Reason why investing in information security is significant

Question text

What jobs in information security is this?

Salary: $95,510
Responsibilities: Information security analysts monitor their companies' computer networks to combat hackers and compile reports of security breaches.

Question text

Fifth Reason why investing in information security is significant

What jobs in information security is this?

Salary: $104,000
Responsibilities: Create an in-office network for a small business or a cloud infrastructure for a business with corporate locations in cities on opposite coasts.

Question text

What jobs in information security is this?

Salary: $139,000
Responsibilities: Information systems managers work toward ensuring a company's tech is capable of meeting their IT goals.

Question text

Information is one of the most significant  resources.

Question text

Fourth Reason why investing in information security is significant

Question text

Fifth Reason why investing in information security is significant

Question text

20 different risk markers grouped under five main categories

Select one:

Question text

Second Reason why investing in information security is significant

Question text

What jobs in information security is this?

Salary: $103,560
Responsibilities: Software developers can be tasked with a wide range of responsibilities that may include designing parts of computer programs and applications and designing how those pieces work together.

Question text

Feeling confident about their organization's security level: When information security community members participated in the Cybersecurity Trends Report, they were asked how positive they felt about their security stance.

Select one:

Question text

was stored in servers in multiple areas, leaving us open to risk.

Question text

Third Reason why investing in information security is significant

Question text

To continue, confidentiality can be easily breached so each employee in an organization or company should be aware of his responsibilities in maintaining confidentiality of the  delegated to him for the exercise of his duties.

Question text

The establishment of the  rotor machine and the subsequent emergence of electronics and computing enabled the usage of much more elaborate schemes and allowed confidentiality to be protected much more effectively.

Question text

The contemporary  differs substantially from the classic one, which used pen and paper for encryption and which was far less complex. 

Question text

 consists of changing the data located in files into unreadable bits of characters unless a key to decode the file is provided.

Question text

 As regards to , its means of protection are somewhat similar – access to the area where the information is kept may be granted only with the proper badge or any different form of authorization, it can be physically locked in a safe or a file cabinet, there could be access controls, cameras, security, etc.

Question text

The aim of  is to ensure that information is hidden from people unauthorized to access it.

Question text

The  Layer describes the notion that access to infrastructure components has to be constrained to business ought-to-know. For instance, access to servers.

Question text

A principle which is a core requirement of information security for the safe utilization, flow, and storage of information is the 

Question text

The  principle dictates that information should solely be viewed by people with appropriate and correct privileges. 

Question text

CIA stands for , integrity, and availability and these are the three main objectives of information security.

Question text

The  Layer describes the notion that the physical access to any system, server, computer, data center, or another physical object storing confidential information has to be constrained to business ought-to-know.

Question text

Тhe concept of layers illustrates that data communications and  are designated to function in a layered manner, transferring the data from one layer to the next.

Question text

The  Layer describes the notion that access to end-user applications have to be constrained to business ought-to-know.

Question text

The  Layer describes the notion that data ought to be secured while in motion.

Question text

Some  are explicitly concerned with protecting information and information systems, but the concept of management controls includes much more than a computer's specific role in enforcing security.

Question text

A major conclusion of this report is that the lack of a clear  of security policy for general computing is a major impediment to improved security in computer systems.

Question text

An  must have administrative procedures in place to bring peculiar actions to the attention of someone who can legitimately inquire into the appropriateness of such actions, and that person must actually make the inquiry. 

Question text

An effective  controls is needed to cover all aspects of information security, including physical security, classification of information, the means of recovering from breaches of security, and above all training to instill awareness and acceptance by people.

Question text

Computers are  entities, and programs can be changed in a twinkling, so that past happiness is no predictor of future bliss.

Question text

Computers are  entities, and programs can be changed in a twinkling, so that past happiness is no predictor of future bliss. 

Question text

An  must have administrative procedures in place to bring peculiar actions to the attention of someone who can legitimately inquire into the appropriateness of such actions, and that person must actually make the inquiry. 

Question text

To be useful, a  must not only state the security need (e.g., for confidentiality—that data shall be disclosed only to authorized individuals), but also address the range of circumstances under which that need must be met and the associated operating standards. 

Question text

A major conclusion of this report is that the lack of a clear  of security policy for general computing is a major impediment to improved security in computer systems.

Question text

 In any particular circumstance, some threats are more probable than others, and a  must assess the threats, assign a level of concern to each, and state a policy in terms of which threats are to be resisted.

Question text

 are the mechanisms and techniques—administrative, procedural, and technical—that are instituted to implement a security policy. 

Question text

The  must be managed by auditing, backup, and recovery procedures supported by general alertness and creative responses. 

Question text

One can implement that policy by taking specific actions guided by management control principles and utilizing specific security standards, procedures, and .

Question text

 may prevent people from doing unauthorized things but cannot prevent them from doing things that their job functions entitle them to do.

Question text

Some  are explicitly concerned with protecting information and information systems, but the concept of management controls includes much more than a computer's specific role in enforcing security.

Question text

 are the mechanisms and techniques—administrative, procedural, and technical—that are instituted to implement a security policy. 

Question text

As viruses have escalated from a hypothetical to a commonplace threat, it has become necessary to rethink such policies in regard to methods of distribution and acquisition of .

Question text

The framework within which an organization strives to meet its needs for information security is codified as 

Question text

An effective  controls is needed to cover all aspects of information security, including physical security, classification of information, the means of recovering from breaches of security, and above all training to instill awareness and acceptance by people.

Question text

 is a concise statement, by those responsible for a system (e.g., senior management), of information values, protection responsibilities, and organizational commitment.