Test Bank for Principles of Information Security, 7th Edition by Michael E. Whitman Module 1-12 A+
30 views 0 purchase
Course
Principles of Information Security, 7th Edition
Institution
Principles Of Information Security, 7th Edition
Book
Principles of Information Security
Test Bank for Principles of Information Security, 7th Edition by Michael E. Whitman Module 1-12 A+Full Modules test bank included 1. Introduction to Information Security. 2. The Need for Security. 3. Legal, Ethical, and Professional Issues in Information Security. 4. Security Management. 5. Incide...
TEST BANK For Principles of Information Security 7th Edition by Whitman and Mattord, Verified Module 1 - 12, Complete Newest Version 100%pass guarantee
SOLUTION MANUAL - Whitman and Mattord, Principles of Information Security 7th Edition, Module 1 - 12, Complete Latest Version
SOLUTION MANUAL - Whitman and Mattord, Principles of Information Security 7th Edition, Module 1 - 12, Complete Latest Version
All for this textbook (41)
Written for
Principles of Information Security, 7th Edition
All documents for this subject (52)
Seller
Follow
ASolution
Reviews received
Content preview
Name: Class: Date:
Full Test Bank for Principles of Information Security, 7th
Edition Module 1-12
Module 1 Introduction to Information Security
True / False
1. During the early years of computing, the primary threats to security were physical theft of equipment, espionage against
the products of the systems, and sabotage.
a. True
b. False
ANSWER: True
POINTS: 1
DIFFICULTY: Easy
REFERENCES: H1: Introduction to Information Security
p. 2
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.2 - Discuss the history of computer security and explain how it
evolved into Information security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/2/2017 3:48 PM
2. Network security focuses on the protection of physical items, objects, or areas from unauthorized access and
misuse.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: H1: What is Security?
p. 8
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 1:54 PM
3. When a computer is the subject of an attack, it is the entity being attacked.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 1
,Name: Class: Date:
POINTS: 1
REFERENCES: p. 10
H1: What is Security?
H2: Key Information Security Concepts
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
4. The value of information comes from the characteristics it possesses.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: p. 11
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
5. E-mail spoofing involves sending an e-mail message with a harmful attachment.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: p. 13
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 12/4/2016 2:02 PM
6. The possession of information is the quality or state of having value for some purpose or end.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 2
,Name: Class: Date:
POINTS: 1
REFERENCES: p. 13
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
7. A breach of possession may not always result in a breach of confidentiality.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: p. 14
H1: What is Security?
H2: Critical Characteristics of Information
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM
8. Hardware is often the most valuable asset possessed by an organization, and it is the main target of intentional attacks.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: p. 16
H1: Components of An Information System
H2: Data
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 11:50 AM
9. Information security can be an absolute.
a. True
b. False
ANSWER: False
Copyright Cengage Learning. Powered by Cognero. Page 3
, Name: Class: Date:
POINTS: 1
REFERENCES: p. 17
H1: Security and The Organization
H2: Balancing Information Security and Access
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
10. To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the
security level must allow reasonable access, yet protect against threats.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: p. 17
H1: Security and The Organization
H2: Balancing Information Security and Access
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 3/8/2017 5:20 PM
11. The bottom-up approach to information security has a higher probability of success than the top-down approach.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: p. 18
H1: Security and The Organization
H2: Approaches to Information Security Implementation
QUESTION TYPE: True / False
HAS VARIABLES: False
LEARNING OBJECTIVES: POIS.WHMA.22.01.3 - Define key terms and critical concepts of information
security
DATE CREATED: 9/14/2016 10:29 AM
DATE MODIFIED: 9/14/2016 10:29 AM
12. Using a methodology will usually have no effect on the probability of success.
a. True
b. False
Copyright Cengage Learning. Powered by Cognero. Page 4
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ASolution. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.