Information Security Can Be An Absolute
20 community-sourced questions and answers. Free — no login.
The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.
True
Network security focuses on the protection of the details of a particular operation or series of activities.
False Network Security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies.
The value of information comes from the characteristics it possesses.
True
When a computer is the subject of an attack, it is the entity being attacked.
False When the subject of an attack, computer is used as an active tool to conduct attack.
An e-mail virus involves sending an e-mail message with a modified field.
False
The possession of information is the quality or state of having value for some purpose or end.
False
A breach of possession always results in a breach of confidentiality.
False
Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.
False
Information security can be an absolute
False
To achieve balance — that is, to operate an information system that satisfies the user and the security professional — the security level must allow reasonable access, yet protect against threats.
True
The bottom-up approach to information security has a higher probability of success then the top-down approach.
False
Using a methodology increases the probability of success.
True
The Implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).
False The Maintenance Phase is.
The investigation phase of the SecSDLC begins with a directive from upper management.
True
The physical design is the blue print for the desired solution.
False
Recently, many states have implemented legislation making certain computer-related activities illegal.
True
Applications systems developed within the framework of traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.
False
A champion is a project manager, who may be a departmental line manager or staff unit manager, and understands project management, personnel management, and information security technical requirements.
False
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
True
The roles of information security professionals are aligned with the goals and mission of the information security community of interest.
True
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials