Preview

Quiz: Security Program

Satisfactory Essays
Open Document
Open Document
357 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Quiz: Security Program
* Question 1
10 out of 10 points | | | Proprietary information is information which may give an organization a competitive edge.Answer | | | | | Selected Answer: | True | Correct Answer: | True | Response Feedback: | Correct | | | | | * Question 2
0 out of 10 points | | | Integrity involves implementation of the necessary level of secrecy and prevention of unauthorized disclosure of sensitive information and resources.Answer | | | | | Selected Answer: | True | Correct Answer: | False | Response Feedback: | Incorrect | | | | | * Question 3
0 out of 10 points | | | Obtaining buy-in on an information security program can be difficult because it is difficult to quantify the return on investment.Answer | | | | | Selected Answer: | False | Correct Answer: | True | Response Feedback: | Incorrect | | | | | * Question 4
10 out of 10 points | | | Availability is concerned solely with providing reliable access to data to authorized individuals.Answer | | | | | Selected Answer: | False | Correct Answer: | False | Response Feedback: | Correct | | | | | * Question 5
10 out of 10 points | | | Integrity involves assuring that the users accessing the information are authorized to do so.Answer | | | | | Selected Answer: | False | Correct Answer: | False | Response Feedback: | Correct | | | | | * Question 6
10 out of 10 points | | | The main objective of information security is to preserve the availability, integrity, and confidentiality of information and knowledge of an organization.Answer | | | | | Selected Answer: | True | Correct Answer: | True | Response Feedback: | Correct | | | | | * Question 7
10 out of 10 points | | | Information classification is best implemented by assigning the highest level of access control to all information.Answer | | | | | Selected Answer: | False |

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2) What is the main goal of information security? A) Protect information from unauthorized use.…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Use the Web to research and evaluate security products from two competing vendors, such a...…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. Information security is necessary for protecting confidentiality, privacy, integrity of processing, and availability of information resources. (Correct. As Figure 8-2 shows, security is the foundation for achieving the other four components of system reliability.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mat 540 Quiz 5

    • 1011 Words
    • 5 Pages

    If we are solving a 0-1 integer programming problem, the constraint x1 ≤ x2 is a conditional constraint.…

    • 1011 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 209 NVQ 2

    • 272 Words
    • 2 Pages

    Aii. Explain why it is important to have secure systems for recording and storing information in a…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cool Paper

    • 781 Words
    • 4 Pages

    Integrity ensures that information is correct and that no unauthorized person or malicious software program can or has altered that data. True or false?…

    • 781 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography and Encryption methods are best ways to ensure confidentiality of data transferred from one computer to another.  Integrity: The ability to ensure that data is an accurate and unchanged representation of the original secure information. One type of security attack is to intercept some important data and make changes to it before sending it on to the intended receiver.  Availability: The best way to ensure Availability is by rigorously maintaining all hardware, performing hardware repairs immediately when needed and maintaining a correctly functioning operating system environment that is free of software conflicts.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Fundamental of information security is based on three principle Confidentiality, Integrity and Availability. How a user will be able to access asset by following these three principle is called as Access control. “Access control is the process of allowing only authorized users, programs and other computer system (i.e. networks) to observe, modify or otherwise take possession of resources of a computer system. It is also a mechanism for limiting the use of some resources to authorized users.”…

    • 553 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    E-Commerce Security Risks

    • 429 Words
    • 2 Pages

    a. Integrity-An unauthorized person intercepting and redirecting a bank wire transfer into a different account.…

    • 429 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Internal Control System

    • 1250 Words
    • 5 Pages

    * Safeguard the assets and secure as far as possible the completeness and accuracy of the records.…

    • 1250 Words
    • 5 Pages
    Good Essays