1.
The value of information comes from the charateristics its possesses.
Correct Answer
A. True
Explanation
The value of information comes from the characteristics it possesses. This means that information is valuable because of its qualities, such as accuracy, relevance, timeliness, and usefulness. Information that possesses these characteristics can help individuals and organizations make informed decisions, solve problems, and gain a competitive advantage. Therefore, it is true that the value of information is derived from the characteristics it possesses.
2.
People are not a threat to information security.
Correct Answer
B. False
Explanation
People can indeed be a threat to information security. Human error, negligence, and malicious intent can all lead to breaches in information security. For example, employees may accidentally click on phishing emails or share sensitive information with unauthorized individuals. Additionally, insider threats can arise from disgruntled employees or individuals seeking to exploit their access to sensitive data. Therefore, it is important to implement security measures and educate individuals to mitigate these risks.
3.
Information security can be an absolute
Correct Answer
B. False
Explanation
Information security cannot be an absolute because it is a continuous process that requires ongoing monitoring, updates, and adaptations to new threats and vulnerabilities. It is impossible to completely eliminate all risks and ensure 100% security. Organizations need to adopt a proactive approach to manage and mitigate risks, but there will always be some level of uncertainty and potential for security breaches. Therefore, the statement that information security can be an absolute is false.
4.
Waterfall is a type of sDlc Methodology.
Correct Answer
A. True
Explanation
Waterfall is indeed a type of Software Development Life Cycle (SDLC) methodology. It is a linear and sequential approach to software development, where each phase of the development process is completed before moving on to the next. The waterfall model follows a structured and rigid process, with defined phases such as requirements gathering, design, implementation, testing, and maintenance. This methodology is often used in projects where the requirements are well-defined and unlikely to change significantly throughout the development process.
5.
A data custodian works directly with data owners and is responsible. for the storage, maintenace, and protection of the information.
Correct Answer
A. True
Explanation
A data custodian is a person or entity that is entrusted with the responsibility of managing and safeguarding data on behalf of data owners. They work closely with data owners to ensure that data is stored securely, maintained properly, and protected from unauthorized access or loss. This involves tasks such as implementing security measures, backing up data, and ensuring compliance with data protection regulations. Therefore, the statement "A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information" is true.
6.
Risk Management starts in the investigation phase.
Correct Answer
B. False
Explanation
Risk Management does not start in the investigation phase. Risk Management is a continuous process that begins at the early stages of a project or activity, such as planning and identification of potential risks. The investigation phase comes later in the process, when risks have already been identified and assessed. Therefore, the given statement is false.
7.
To achieve balance that is to operate an information system to the satisfaction of the user and the security professional the level of security must allow reasonable access, yet protect against threats.
Correct Answer
A. True
Explanation
To achieve balance in operating an information system, it is important to strike a balance between providing reasonable access to users and ensuring security against potential threats. This means that the level of security implemented should not be overly restrictive, as it should allow users to access the system and its resources in a reasonable manner. However, it should also provide adequate protection against potential threats to maintain the integrity, confidentiality, and availability of the system and its data. Therefore, the statement "To achieve balance that is to operate an information system to the satisfaction of the user and the security professional the level of security must allow reasonable access, yet protect against threats" is true.
8.
A sniffer program shows all the data on an uswitched network segment by including unencrypted passwords and the data inside files.
Correct Answer
A. True
Explanation
A sniffer program is a type of software that can intercept and analyze network traffic. It is designed to capture and display all the data that is being transmitted over an unswitched network segment. This includes unencrypted passwords and the contents of files. Therefore, the statement that a sniffer program shows all the data on an unswitched network segment, including unencrypted passwords and file data, is true.
9.
A firewall is a device that keeps certain kinds of Network traffic out of a Private network.
Correct Answer
A. True
Explanation
A firewall is a security device that is designed to monitor and control incoming and outgoing network traffic. It acts as a barrier between a private network and the public internet, allowing only authorized and safe traffic to pass through while blocking potentially harmful or unauthorized traffic. Therefore, the statement that a firewall keeps certain kinds of network traffic out of a private network is true.
10.
Expert Hackers are extremetly talented individuals who usually have lost of time and energy to devote to attempting to break into other peoples Inforation systems.
Correct Answer
A. True
Explanation
Expert hackers are indeed highly skilled individuals who possess extensive knowledge and expertise in attempting to breach other people's information systems. They invest significant amounts of time and energy into their activities, constantly seeking vulnerabilities and exploiting them for unauthorized access. Therefore, the statement presented in the question is accurate, stating that expert hackers are extremely talented individuals who dedicate their time and energy to breaking into other people's information systems.
11.
Which of the following functions does information security perform for an organization?
Correct Answer
D. All of the Above.
Explanation
Information security performs all of the mentioned functions for an organization. It protects the organization's ability to function by safeguarding its systems and networks from unauthorized access or disruption. It enables the safe operation of applications implemented on the organization's IT systems by implementing measures such as access controls and encryption. Additionally, it protects the data that the organization collects and uses by implementing measures like data encryption, data backups, and data loss prevention techniques. Therefore, the correct answer is "All of the Above."
12.
Acts of ___ can lead to unauthorized real or virtual actions that enable information gatherers to enter pemises or systems they have not been authorized to enter
Correct Answer
C. Trespass
Explanation
The correct answer is "trespass". Trespass refers to the act of entering a place or accessing systems without proper authorization. This can lead to unauthorized actions, both in the physical world and in virtual environments, allowing information gatherers to gain access to premises or systems they are not supposed to enter.
13.
There are generally two skill levels among hackers: expert and ____
Correct Answer
A. Novice
Explanation
The given question is asking about the skill levels among hackers. The word "expert" suggests that there is a high level of skill, so the opposite of that would be a low level of skill. Among the given options, "Novice" best represents a low level of skill, as it refers to someone who is new or inexperienced in a particular field. Therefore, the correct answer is Novice.
14.
Deliberate software attacks are referred to as
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above." Deliberate software attacks can be referred to as malicious code, malicious software, or malware. These terms are used interchangeably to describe software that is designed to harm or exploit computer systems, networks, or users. These attacks can include viruses, worms, Trojans, ransomware, spyware, and other forms of malicious software.
15.
The most successful kind of top-down approach involves a formal development strategy referred to a(n)
Correct Answer
C. Systems development life cycle
Explanation
The correct answer is "systems development life cycle". The systems development life cycle (SDLC) is a formal development strategy that involves a systematic approach to designing, developing, and maintaining information systems. It consists of several phases, including planning, analysis, design, implementation, and maintenance. This approach ensures that the development process is well-structured, organized, and efficient, leading to successful outcomes.
16.
The ____ model consists of 5 general phases.
Correct Answer
C. Waterfall
Explanation
The correct answer is "Waterfall." The Waterfall model is a software development model that consists of five general phases: requirements, design, implementation, testing, and maintenance. In this model, each phase is completed before moving on to the next one, with little to no overlap between phases. This sequential approach allows for a structured and systematic development process, ensuring that each phase is completed thoroughly before progressing further.
17.
In the ___ phase of the systems development life cycle, solution are evaluated, selected, and acquired through a make-or-buy process.
Correct Answer
B. Implementation
Explanation
In the implementation phase of the systems development life cycle, solutions are evaluated, selected, and acquired through a make-or-buy process. This phase involves putting the chosen solution into action and making it operational. It includes activities such as coding, testing, training, and data conversion. The implementation phase is crucial as it ensures that the selected solution is successfully integrated into the organization's existing systems and processes.
18.
Which of the following phases is the longest and most expensive phase of the system development life cyle?
Correct Answer
D. Maintenace and change
Explanation
The maintenance and change phase is the longest and most expensive phase of the system development life cycle because it involves ongoing support, bug fixes, and updates to the system after it has been implemented. This phase requires continuous monitoring and management to ensure that the system remains functional and meets the changing needs of the users. Additionally, any changes or enhancements made to the system during this phase can be costly in terms of resources, time, and effort.
19.
___ is a project manager, who may be a departmental line manager or staf unit manager.
Correct Answer
B. Team leader
Explanation
A team leader is a project manager who may be a departmental line manager or staff unit manager. This means that a team leader is responsible for managing a team within a specific department or unit. They oversee the work of the team members, provide guidance and support, and ensure that the project is completed successfully. As a project manager, the team leader has the authority to make decisions and allocate resources to achieve the project goals.
20.
___ has the primary responsibility for the assessment, management, and implementation of information security in the organization.
Correct Answer
C. CISO
Explanation
The Chief Information Security Officer (CISO) is responsible for the assessment, management, and implementation of information security in the organization. They oversee the development and execution of security policies, procedures, and controls to protect the organization's information assets. The CISO works closely with other security professionals to identify and mitigate risks, respond to security incidents, and ensure compliance with relevant regulations and standards. The CISO plays a crucial role in safeguarding the organization's sensitive data and ensuring the confidentiality, integrity, and availability of information systems.