Podcast
Questions and Answers
Communications security involves the protection of an organization's ____.
Communications security involves the protection of an organization's ____.
The protection of information and the systems and hardware that use, store, and transmit that information is known as ____.
The protection of information and the systems and hardware that use, store, and transmit that information is known as ____.
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
____ leaders are also known as "laid-back" leaders.
____ leaders are also known as "laid-back" leaders.
Signup and view all the answers
An information system possesses the characteristic of ____ when it is able to recognize individual users
An information system possesses the characteristic of ____ when it is able to recognize individual users
Signup and view all the answers
Which of the following is a project not a managed process?
Which of the following is a project not a managed process?
Signup and view all the answers
Physical security is concerned with the protection of the ____.
Physical security is concerned with the protection of the ____.
Signup and view all the answers
The principle of management dedicated to the structuring of resources to support the accomplishment of objectives is called
____.
The principle of management dedicated to the structuring of resources to support the accomplishment of objectives is called ____.
Signup and view all the answers
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information
Signup and view all the answers
The C.I.A. triangle is an important element of the CNSS model or McCumber cube of information security.
The C.I.A. triangle is an important element of the CNSS model or McCumber cube of information security.
Signup and view all the answers