1.
____ is the predecessor to the Internet.
Answer
a.
DES
b.
FIPS
c.
ARPANET
d.
NIST
1 points
Question 127
1.
A famous study entitled “Protection Analysis: Final Report” was published in ____.
Answer
a.
1868
b.
1978
c.
1988
d.
1998
1 points
Question 128
1.
____ was the first operating system to integrate security as its core functions.
Answer
a.
ARPANET
b.
UNIX
c.
MULTICS
d.
DOS
1 points
Question 129
1.
____ security addresses the issues necessary to protect the tangible items, objects, or areas of an organization from unauthorized access and misuse.
Answer
a.
Standard
b.
Physical
c.
Object
d.
Personal
1 points
Question 130
1.
A(n) ____ attack is a hacker using a personal computer to break into a system.
Answer
a. indirect b. hardware c. software d. direct 1 points
Question 131
1.
A computer is the ____ of an attack when it is used to conduct the attack.
Answer
a. object b. subject c. target d. facilitator 1 points
Question 132
1.
____ of information is the quality or state of being genuine or original.
Answer
a.
Authenticity
b.
Confidentiality
c.
Spoofing
d.
Authorization
1 points
Question 133
1.
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a ____ value.
Answer
a. hashing b. code c. hash d. key 1 points
Question 134
1.
____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.
Answer
a.
IEEE 802.11(g)
b.
NSTISSI No. 4011
c.
ISO 17788
d.
NIST SP 800-12
1 points
Question 135
1.
An information system is the entire set of ____, people, procedures, and networks that make possible the use of information resources in the organization.