, Information security and IT risk
management – Question bank
By Manish Agrawal, Alex Campoe and Eric Pierce
Chapter 1 - Introduction
1. Information security is becoming increasingly important because of
a) The increasing criticality of information to individuals and organizations
b) There is a general increase in criminal behavior in society
c) People are greedier these days
d) Organizations are wealthier these days
Answer: (a)
2. Many users are vulnerable to
a) Attacks on ATM machines
b) Stolen usernames and passwords from a compromised site being used to
compromise their bank accounts
c) Hackers compromising the IT systems at large financial institutions
d) Demands for usernames and passwords at gun-point
Answer: (b)
3. The biggest time-consuming activity for most Information security professionals is
a) Responding to information security incidents
b) Fixing software bugs
c) Researching new technologies
d) Helping customers
,Answer: (c)
4. Information security professional do not report spending a lot of time on
a) Researching new technologies
b) Political issues
c) Developing internal security policies, standards and procedures
d) Fixing software bugs
Answer: (d)
5. Desired competencies for information security professionals include all of the
following except
a) Marketing
b) Risk management
c) Secure SDLC
d) Forensics
Answer: (a)
6. A desired competency for information security professionals is
a) Marketing
b) End user awareness
c) Financial planning
d) Accounting
Answer: (b)
7. As the use of personal devices for work has increased, the work of information
security professionals has
a) Decreased
b) Stayed the same
, c) Increased
d) None of the above
Answer: (c)
8. Information security professional report spending a lot of time on
a) Researching new technologies
b) Political issues
c) Developing internal security policies, standards and procedures
d) Fixing software bugs
Answer: (d)
9. The Internet is relevant for information security because
a) It exposed computers to attacks from around the world
b) It caused one of the most significant Internet outages ever
c) It led to exploits from weakness is wireless networks
d) It caused falsification of financial records at publicly traded companies
Answer: (a)
10. The gang of 414 is famous in the information security literature for
a) Causing one of the most significant Internet outages ever
b) Intruding into a number of high profile computer installations
c) Stealing commercial information by exploiting weakness is wireless networks
d) Falsification of financial records at publicly traded companies
Answer: (b)
11. The Morris worm is well known in the information security literature for
a) Intruding into a number of high profile computer installations
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ExamsExpert. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $29.71. You're not tied to anything after your purchase.