RTU College of Engineering and Architecture Midterm Exam on Information Assurance and Security
25 Questions
0 Views

RTU College of Engineering and Architecture Midterm Exam on Information Assurance and Security

Created by
@CompliantGeranium

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Uses an access matrix of subject and labeled objects. ___________ MODEL 11.

BELLLAPADULA

This model is to secure the confidentiality of data with respect to different levels of secrecy. ___________ MODEL 10.

BELLLAPADULA

Secret can't request from top secret use. ___________ PROPERTY 12.

INVOCATION

A process wherein the user needs to fully verify the data they requested before they get access to it. INTEGRATION VERIFICATION ___________ 15.

<p>PROCESS</p> Signup and view all the answers

The law that outlines important measures the government should take to protect its own systems from various assaults. COMPUTER ___________ ACT 20.

<p>SECURITY</p> Signup and view all the answers

They offer a structure for defending against online dangers including illegal access and data breaches. ___________ STANDARDS 22.

<p>SECURITY</p> Signup and view all the answers

It includes physical approaches in addition to digital ones for data protection. INFORMATION ______

<p>ASSURANCE</p> Signup and view all the answers

One of the importance aspects of INFORMATION ______ is to prevent cyber-attacks by utilizing firewalls and other deterrents.

<p>SECURITY</p> Signup and view all the answers

It involves measures to maintain data accessible despite system errors and intervention from outside sources. ______

<p>AVAILABILITY</p> Signup and view all the answers

It ensures that system information is not given to unauthorized access and is only read and understood by people with the appropriate authorizations. ______

<p>CONFIDENTIALITY</p> Signup and view all the answers

This group is in charge of making sure that the concerns of stakeholders are addressed and has representation from across the institution. STEERING ______

<p>COMMITTEE</p> Signup and view all the answers

This group develops strategies and ensures integration with and cooperation of business unit managers and process owners. ______

<p>EXECUTIVES</p> Signup and view all the answers

This level of data includes internal information like operating while essential to an organization, ______.

<p>processes</p> Signup and view all the answers

Standard that is Developed by the ______ Institute of Standards and Technology (NIST).

<p>National</p> Signup and view all the answers

It also hides your IP address, allowing you to browse the web anonymously and ______.

<p>securely</p> Signup and view all the answers

It also helps to ensure that data is compliant with applicable laws and ______.

<p>regulations</p> Signup and view all the answers

This act covers computer crimes that are perpetrated in international trade and ______.

<p>commerce</p> Signup and view all the answers

It's the knowledge of right and wrong, and the ability to adhere to ______ principles while on the job.

<p>ethical</p> Signup and view all the answers

The following are the capabilities of BIBA Security model in keeping the information safe. EXCEPT a.Access can grant easily regardless the level of access control b.Ensure data integrity c.Authentication prevents unauthorized users.d.Has it’s invocation property when it comes to request service 34.Digital markers help systems because they make it easier to identify sensitive information before it leaks out of an organization. a.CIA b.ISO c.DLP d.GDRP RIZAL TECHNOLOGICAL UNIVERSITY Boni Ave, Mandaluyong City College of Engineering and Architecture 35.Is a certain type of data that may be recorded in any format and has the potential to be useful to a company. a.Information Handling b.Data Asset c.Data Hiding d.Information Asset 36.It represents all the information that is available to most of the employees, but not to all of them. a.Restricted Information b.Limited Information c.Classified Data d.Constrained Data 37.The following are the key elements of security guidelines. EXCEPT a.Implement access controls b.Conduct a risk assessment c.Third-Party Security d.Information Restrictions 38.It is essential that you develop a method to ensure that the information is only given to those who are listed on the list of approved recipients. a.Authorized Recipients Data b.Data Access Control c.Data Distribution d.Clear Marking 39.is a process to decide what information should be classified as what and how, and how it should be managed. a.______ b.

<p>Data Asset Classification</p> Signup and view all the answers

Digital markers help systems because they make it easier to identify sensitive information before it leaks out of an organization. a.______ b.ISO c.DLP d.GDRP

<p>CIA</p> Signup and view all the answers

Is a certain type of data that may be recorded in any format and has the potential to be useful to a company. a.______ b.Data Asset c.Data Hiding d.Information Asset

<p>Information Handling</p> Signup and view all the answers

It represents all the information that is available to most of the employees, but not to all of them. a.______ b.Limited Information c.Classified Data d.Constrained Data

<p>Restricted Information</p> Signup and view all the answers

The following are the key elements of security guidelines. EXCEPT a.Implement access controls b.Conduct a risk assessment c.______ d.Information Restrictions

<p>Third-Party Security</p> Signup and view all the answers

It is essential that you develop a method to ensure that the information is only given to those who are listed on the list of approved recipients. a.______ b.Data Access Control c.Data Distribution d.Clear Marking

<p>Authorized Recipients Data</p> Signup and view all the answers

Information Classification c.Information Asset Classification d.Data Classification 40.It is the person who is in charge of, accountable for, and interested in the gathering, integrity, and accessibility of information.a.Data Owner b.System Owner c.Data Custodian d.Security Administrator RIZAL TECHNOLOGICAL UNIVERSITY Boni Ave, Mandaluyong City College of Engineering and Architecture TRUE OR FALSE: Read and analyze the following statement and write T if it’s true otherwise F if false in the space provided. 41.The main objective of BIBA Security model is the confidentiality of all the information or data in the system.FALSE 42.Design a system that is resilient to denial of service attacks and usage spikes.TRUE 43.Star Confidentiality Rule states that the user can only Read the files on the Same Layer of Secrecy and the Upper Layer of Secrecy but not the Lower Layer of Secrecy, due to which we call this rule as NO WRITE-DOWN.FALSE 44.Graham–Denning is primarily concerned with how a model system controls subjects and objects at a very basic level where other models simply assumed such control.TRUE 45.In Bell-Lapadula systems are divided into User and labeled Data.TRUE 46.Information assurance investments are intended to support organizational objectives.FALSE 47.One of the effective governance in security is Establishing the proper institutional structure and segregation of duties.FALSE 48.

Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser