False: Physical Security vs. ARPANET

Unlock all answers in this set

Unlock answers
question
The bottom-up approach to information security has a higher probability of success than the top-down approach
answer
False
question
_____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
answer
Physical
question
__________ is a network project that preceded the Internet.
answer
ARPANET
question
The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
answer
False
question
Part of the logical design phase of the SecSDLC is planning for partial or catastrophic loss. ____ dictates what immediate steps are taken when an attack occurs.
answer
Incident response
question
An e-mail virus involves sending an e-mail message with a modified field.
answer
False
question
Many states have implemented legislation making certain computer-related activities illegal.
answer
True
question
A breach of possession always results in a breach of confidentiality
answer
False
question
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number called the __________ value.
answer
hash
question
To achieve balance — that is, to operate an information system that satisfies the user and the security professional — the security level must allow reasonable access, yet protect against threats
answer
True
question
Policies are detailed written instructions for accomplishing a specific task.
answer
False
question
The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.
answer
True
question
The investigation phase of the SecSDLC begins with a directive from upper management.
answer
True
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New