Home
Subjects
Solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching termsHow do you want to study today?
Flashcards
Learn
Test
Match
Terms in this set (15)
access
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
physical design
During the __________ phase, specific technologies are selected to support the alternatives identified and evaluated in the prior phases.
True
A breach of possession may not always result in a breach of confidentiality.
exploit
A technique used to compromise a system is known as a(n) ___________.
True
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.
information security
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.
logical
The __________ design phase of an SDLC methodology is implementation independent, meaning that it contains no reference to specific technologies, vendors, or products.
False
The physical design is the blueprint for the desired solution.
DevOps
An emerging methodology to integrate the effort of the development team and the operations team to improve the functionality and security of applications is known as __________.
All of the above
Data owners
Data custodians
Data users
Which of the following is a valid type of role when it comes to data ownership?
direct
A server would experience a(n) __________ attack when a hacker compromises it to acquire information via a remote location using a network connection.
NSTISSI No. 4011
_________ has become a widely accepted evaluation standard for training and education related to the security of information systems.
False
Using a methodology will usually have no effect on the probability of success.
vulnerabilities
The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.
False
E-mail spoofing involves sending an e-mail message with a harmful attachment
Recommended textbook solutions
Advanced Engineering Mathematics
10th EditionErwin Kreyszig
4,134 solutions
Elementary Number Theory
7th EditionDavid Burton
776 solutions
Introduction to Real Analysis
4th EditionDonald R. Sherbert, Robert G. Bartle
842 solutions
Fundamentals of Complex Analysis with Applications to Engineering, Science & Mathematics, International
3rd EditionArthur David Snider, Edward B. Saff
772 solutions
Sets with similar termsInformation Security (Exam 1, Chapter 1)
37 terms
nikkitucker
Chapter 1: Introduction to Information Security
89 terms
Mowriah
Principles of Information Security, 5th Edition- C…
45 terms
misscarswell
Intro to Information Security
55 terms
Theresa0425
Sets found in the same folderChapter 5 - ITSY 1300
50 terms
abbyoatman
CH 2
91 terms
catcode
Information Security Chapter 2
75 terms
divyae
ch 3
83 terms
catcode
Other sets by this creatorQuiz 8
20 terms
adlacey
Quiz 7
10 terms
adlacey
Quiz 5
42 terms
adlacey
Quiz 4
22 terms
adlacey
ADVANCED MATH
Chris walks halfway along a 100-m track in 1 min, then half of the remaining distance in the next minute, then half of the remaining distance in the third minute, and so on. a) How far has Chris walked after 10 min? b) Will Chris get to the end of the track? Explain. Include a table of values and a graph to support your explanation. c) Write an equation to model this situation.
Verified answer
ADVANCED MATH
An electronics firm has a contract to deliver the following number of radios during the next three months; month 1, 200 radios; month 2, 300 radios; month 3, 300 radios. For each radio produced during months 1 and 2, a $10 variable cost is incurred; for each radio produced during month 3, a$12 variable cost is incurred. The inventory cost is $1.50 for each radio in stock at the end of a month. The cost of setting up for production during a month is$250. Radios made during a month may be used to meet demand for that month or any future month. Assume that production during each month must be a multiple of 100. Given that the initial inventory level is 0 units, use dynamic programming to determine an optimal production schedule.
Verified answer
ADVANCED MATH
Each of the following passages contains a single argument. Using the letters “P” and “C,” identify the premises and conclusion of each argument, writing premises first and conclusion last. List the premises in the order in which they make the most sense (usually the order in which they occur), and write both premises and conclusion in the form of separate declarative sentences. Indicator words may be eliminated once premises and conclusion have been appropriately labeled. Neither a borrower nor lender be For loan oft loses both itself and friend, And borrowing dulls the edge of husbandry.
Verified answer
ADVANCED MATH
Represent each of the primes 113, 229, and 373 as a sum of two squares.
Verified answer
Other Quizlet setsA&P Lecture Test 2
101 terms
jmurray993
Online Chapter History Quiz 17
20 terms
Jessica2952
hosa- Chapter 8 test
34 terms
viltzchl000
Med Neuro final exam 3
11 terms
suxinhaku
Related questionsQUESTION
Which type of planning is the primary tool in determining the long-term direction taken by an organization?
15 answers
QUESTION
In your introduction to SAP exercises, you learned about transaction codes and you reviewed three transaction codes about sales orders: VA01, VA02, and VA03. What does VA01 stand for?
4 answers
QUESTION
What was the software called that was found in most early computers from the 1950s into the 1970s and is considered a precursor to the modern operating system?
15 answers
QUESTION
A personal information manager helps users store, organize, and retrieve information about customers and prospects, and schedule and manage appointments.
4 answers