Information Assurance and Security 2 (Source 2)
Information Assurance and Security 2 (Source 2)
Question 1
Correct
Email spoofing typically uses an email address that mimics a trusted party, such as a manager, executive or co-worker, and can be
difficult to recognize (especially on mobile devices).
Question 2
Incorrect
It supports accountability and therefore are valuable to management and to internal or external auditors.
Question 3
Correct
They are assigned to the overall responsibility for information security and should include specific organizational roles.
about:blank 1/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 4
Correct
It may even affect applications that do not involve communication at all: the risks of interconnection are borne not only by the
applications they benefit, but also by other applications that share the same equipment.
Question 5
Correct
It includes environmental controls such as guards, locks, doors, and fences as well as protection against and recovery from fire, flood,
and other natural hazards.
Question 6
Correct
Such mechanisms are called discretionary a by the DOD, and user-directed, identity-based access controls by the
International Organization for Standards.
Question 7
Incorrect
Proper cyber defense training should cover the following: Phishing Aware , __________, ________, and _________.
about:blank 2/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 8
Correct
It may prevent people from doing unauthorized things but cannot prevent them from doing things that their job functions entitle
them to do.
Question 9
Incorrect
A multi-factor authentication (MFA) solution that allows you to use a second factor that you have or have access to when you log in
to your account.
Answer: Authenticator
Question 10
Correct
An international network of computer systems that has evolved over the last decade, provides electronic mail, file transfer, and
remote log-in capabilities.
Answer: Internet
Question 11
Incorrect
In these systems (e.g., Bitnet) messages travel lengthy paths through computers in the control of numerous organizations of which
the communicants are largely unaware, and for which message handling is not a central business concern.
about:blank 3/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 12
Correct
Question 13
Incorrect
They consolidate various preparing subjects and instructing procedures to help ensure worker readiness and improve their guarded
reactions.
Question 14
Incorrect
Question 15
Correct
It is concerned with assessing risks and developing plans for averting or recovering from adverse events that might render a system
unavailable.
Question 16
Incorrect
They provide independent assurance to management on the appropriateness of the security objectives.
about:blank 4/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 17
Correct
The year when the Internet was attacked by a self-replicating program called a worm that spread within hours to somewhere
between 2,000 and 6,000 computer systems—the precise number remains uncertain. Only systems (VAX and Sun 3) running certain
types of Unix (variants of BSD 4) were affected.
Question 18
Correct
Ensuring information is disclosed to, and reviewed exclusively by intended recipients/authorized individuals.
Answer: Confidentiality
Question 19
Correct
Answer: phishing
Question 20
Correct
It has much in common with a failure that results from faulty equipment, software, or operations.
Question 21
Incorrect
Identity information, financial records, healthcare records, etc. are examples of personally id .
about:blank 5/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 22
Correct
Answer: system
Question 23
Correct
A function that has custody of the system/databases, not necessarily belonging to them, for any period of time.
Question 24
Incorrect
Question 25
Incorrect
The basic principles in preventing breaches of security: confidentiality , __________, and _______.
about:blank 6/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 26
Incorrect
It might be expected to provide confidentiality if it serves diverse clientele, integrity if it is used as a development environment for
software or engineering designs, and availability to the extent that no one user can monopolize the service and that lost files will be
retrievable.
Question 27
Correct
A system's audit records, often called an audit trail , have other potential uses besides establishing accountability.
Question 28
Correct
Answer: Integrity
Question 29
Incorrect
Organizations and people that use computers can describe their needs for information security and trust in systems in terms of three
major requirements: confidentiality , __________, and _________.
Question 30
Correct
Responsible for using resources and preserving availability, integrity, and confidentiality of assets and responsible for adhering to
security policy.
Answer: Users
about:blank 7/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 31
Correct
It is offered by few computer systems today, although a legal need for it can be foreseen as computer-mediated transactions
become more common in business.
Answer: Nonrepudiation
Question 32
Correct
The attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for
malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Answer: Phishing
Question 33
Correct
It determines whether a particular user, who has been authenticated as the source of a request to do something, is trusted for that
operation.
Answer: Authorization
Question 34
Correct
Answer: WannaCry
about:blank 8/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 35
Correct
It may check that software has not changed, that file access controls are properly set, that obsolete user accounts have been turned
off, that incoming and outgoing communications lines are correctly enabled, that passwords are hard to guess, and so on.
Question 36
Correct
It specifies that important operations cannot be performed by a single person but instead require the agreement of (at least) two
different people.
Question 37
Incorrect
It can be fortified by workers being sent fake phishing and malware messages to perceive how they respond, and afterward gave
focused on preparing to the individuals who neglect to react in a safe way.
Question 38
Correct
It can install keyloggers to capture everything you type, control your webcam/microphone, or send all your data to remote servers
that the criminal controls.
Answer: Malware
about:blank 9/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
Question 39
Correct
It is an example of a broader class of controls that attempt to specify who is trusted for a given purpose.
Question 40
Incorrect
Planning a security program is somewhat like buying insurance. An organization must consider the following: Threats ,
_________, _________, _________, and __________.
Question 41
Correct
To ensure availability usually includes responses only to acts of God (e.g., earthquakes) or accidental anthropogenic events (e.g., a
toxic gas leak preventing entry to a facility).
Question 42
Correct
These is the mechanisms and techniques—administrative, procedural, and technical—that are instituted to implement a security
policy.
about:blank 10/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
about:blank 11/12
11/4/24, 3:26 PM Information Assurance and Security 2 (source 2)
about:blank 12/12