• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Security is a process that is:

A. Continuous
B. Indicative
C. Examined
D. Abnormal
Continuous
What are the three fundamental principles of security?

A. Accountability, confidentiality, and integrity
B. Confidentiality, integrity, and availability
C. Integrity, availability, and accountability
D. Availability, accountability, and confidentiality
Confidentiality, integrity, and availability
Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality of transactions
over networks may be maintained?

A. Communications security management and techniques
B. Networks security management and techniques
C. Clients security management and techniques
D. Servers security management and techniques
Communications security management and techniques
Making sure that the data is accessible when and where it is needed is which of the following?

A. Confidentiality
B. integrity
C. acceptability
D. availability
availability
Which of the following describes elements that create reliability and stability in networks and systems and which assures that
connectivity is accessible when needed?

A. Availability
B. Acceptability
C. Confidentiality
D. Integrity
Availability
Most computer attacks result in violation of which of the following security properties?

A. Availability
B. Confidentiality
C. Integrity and control
D. All of the choices.
All of the choices.
Which of the following are objectives of an information systems security program?

A. Threats, vulnerabilities, and risks
B. Security, information value, and threats
C. Integrity, confidentiality, and availability.
D. Authenticity, vulnerabilities, and costs.
Integrity, confidentiality, and availability.
An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of
Availability can be defined as:

A. Netware availability
B. Network availability
C. Network acceptability
D. Network accountability
Network availability
The Structures, transmission methods, transport formats, and security measures that are used to provide integrity, availability, and
authentication, and confidentiality for transmissions over private and public communications networks and media includes:

A. The Telecommunications and Network Security domain
B. The Telecommunications and Netware Security domain
C. The Technical communications and Network Security domain
D. The Telnet and Security domain
The Telecommunications and Network Security domain
Which one of the following is the MOST crucial link in the computer security chain?

A. Access controls
B. People
C. Management
D. Awareness programs
Management