Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Security is a process that is:
A. Continuous B. Indicative C. Examined D. Abnormal |
Continuous
|
|
What are the three fundamental principles of security?
A. Accountability, confidentiality, and integrity B. Confidentiality, integrity, and availability C. Integrity, availability, and accountability D. Availability, accountability, and confidentiality |
Confidentiality, integrity, and availability
|
|
Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality of transactions
over networks may be maintained? A. Communications security management and techniques B. Networks security management and techniques C. Clients security management and techniques D. Servers security management and techniques |
Communications security management and techniques
|
|
Making sure that the data is accessible when and where it is needed is which of the following?
A. Confidentiality B. integrity C. acceptability D. availability |
availability
|
|
Which of the following describes elements that create reliability and stability in networks and systems and which assures that
connectivity is accessible when needed? A. Availability B. Acceptability C. Confidentiality D. Integrity |
Availability
|
|
Most computer attacks result in violation of which of the following security properties?
A. Availability B. Confidentiality C. Integrity and control D. All of the choices. |
All of the choices.
|
|
Which of the following are objectives of an information systems security program?
A. Threats, vulnerabilities, and risks B. Security, information value, and threats C. Integrity, confidentiality, and availability. D. Authenticity, vulnerabilities, and costs. |
Integrity, confidentiality, and availability.
|
|
An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of
Availability can be defined as: A. Netware availability B. Network availability C. Network acceptability D. Network accountability |
Network availability
|
|
The Structures, transmission methods, transport formats, and security measures that are used to provide integrity, availability, and
authentication, and confidentiality for transmissions over private and public communications networks and media includes: A. The Telecommunications and Network Security domain B. The Telecommunications and Netware Security domain C. The Technical communications and Network Security domain D. The Telnet and Security domain |
The Telecommunications and Network Security domain
|
|
Which one of the following is the MOST crucial link in the computer security chain?
A. Access controls B. People C. Management D. Awareness programs |
Management
|