Podcast
Questions and Answers
Communications security involves the protection of an organization's ____.
Communications security involves the protection of an organization's ____.
- a. data network devices
- b. employees
- c. physical assets
- d. technology (correct)
The protection of information and the systems and hardware that use, store, and transmit that information is known as ____.
The protection of information and the systems and hardware that use, store, and transmit that information is known as ____.
- a. authentication
- b. information security (correct)
- c. identification
- d. security
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
- True (correct)
- False
____ leaders are also known as "laid-back" leaders.
____ leaders are also known as "laid-back" leaders.
An information system possesses the characteristic of ____ when it is able to recognize individual users
An information system possesses the characteristic of ____ when it is able to recognize individual users
Which of the following is a project not a managed process?
Which of the following is a project not a managed process?
Physical security is concerned with the protection of the ____.
Physical security is concerned with the protection of the ____.
The principle of management dedicated to the structuring of resources to support the accomplishment of objectives is called
____.
The principle of management dedicated to the structuring of resources to support the accomplishment of objectives is called ____.
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information
The C.I.A. triangle is an important element of the CNSS model or McCumber cube of information security.
The C.I.A. triangle is an important element of the CNSS model or McCumber cube of information security.