Communications Security Quiz
10 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Communications security involves the protection of an organization's ____.

  • a. data network devices
  • b. employees
  • c. physical assets
  • d. technology (correct)

The protection of information and the systems and hardware that use, store, and transmit that information is known as ____.

  • a. authentication
  • b. information security (correct)
  • c. identification
  • d. security

The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.

  • True (correct)
  • False

____ leaders are also known as "laid-back" leaders.

<p>c. Laissez-faire (C)</p> Signup and view all the answers

An information system possesses the characteristic of ____ when it is able to recognize individual users

<p>d. identification (D)</p> Signup and view all the answers

Which of the following is a project not a managed process?

<p>b. installation of a new firewall system (B)</p> Signup and view all the answers

Physical security is concerned with the protection of the ____.

<p>b. physical assets of the organization (B)</p> Signup and view all the answers

The principle of management dedicated to the structuring of resources to support the accomplishment of objectives is called ____.

<p>d. organization (D)</p> Signup and view all the answers

____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information

<p>b. Confidentiality (B)</p> Signup and view all the answers

The C.I.A. triangle is an important element of the CNSS model or McCumber cube of information security.

<p>True (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser