Communications Security Quiz
10 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Communications security involves the protection of an organization's ____.

  • a. data network devices
  • b. employees
  • c. physical assets
  • d. technology (correct)
  • The protection of information and the systems and hardware that use, store, and transmit that information is known as ____.

  • a. authentication
  • b. information security (correct)
  • c. identification
  • d. security
  • The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.

  • True (correct)
  • False
  • ____ leaders are also known as "laid-back" leaders.

    <p>c. Laissez-faire</p> Signup and view all the answers

    An information system possesses the characteristic of ____ when it is able to recognize individual users

    <p>d. identification</p> Signup and view all the answers

    Which of the following is a project not a managed process?

    <p>b. installation of a new firewall system</p> Signup and view all the answers

    Physical security is concerned with the protection of the ____.

    <p>b. physical assets of the organization</p> Signup and view all the answers

    The principle of management dedicated to the structuring of resources to support the accomplishment of objectives is called ____.

    <p>d. organization</p> Signup and view all the answers

    ____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information

    <p>b. Confidentiality</p> Signup and view all the answers

    The C.I.A. triangle is an important element of the CNSS model or McCumber cube of information security.

    <p>True</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser