10 Questions
Communications security involves the protection of an organization's ____.
d. technology
The protection of information and the systems and hardware that use, store, and transmit that information is known as ____.
b. information security
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
True
____ leaders are also known as "laid-back" leaders.
c. Laissez-faire
An information system possesses the characteristic of ____ when it is able to recognize individual users
d. identification
Which of the following is a project not a managed process?
b. installation of a new firewall system
Physical security is concerned with the protection of the ____.
b. physical assets of the organization
The principle of management dedicated to the structuring of resources to support the accomplishment of objectives is called ____.
d. organization
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information
b. Confidentiality
The C.I.A. triangle is an important element of the CNSS model or McCumber cube of information security.
True
Test your knowledge on the protection of an organization's sensitive information and data through communications security measures.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free