What is the quality or state of being genuine or original rather than a reproduction or fabrication?

focusNode

Didn't know it?
click below

Knew it?
click below

What is the quality or state of being genuine or original rather than a reproduction or fabrication?

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Principles of information security

QuestionAnswer
...of information is the quality or state of being genuine or original, rather than a reproduction or fabrication. Authenticity
A...is a formal approach to solving a problem based on a structured sequence of procedures. methodology
The...component of the information system comprises applications, operating systems, and assorted command utilities. software
The McCumber cube consists of 27 cells representing areas that must be addressed to secure today's information systems. The final axis consists of storage,... and transmission processing
A frequently overlooked component of information systems, ... are written instructions for accomplishing a specific task. Procedures
The...of information is defined as having ownership or control of some object or item possession
In an organization, the value of ... of information is especially high when it involves personal information about employees, customers, or patients confidentiality
The...phase consists primarily of assessments of the organization the status of current system, and the capability to support the proposed systems. analysis
In the ... approach the project is initiated by upper_level managers who issue policy, procedures and processes, dictate the goals and expected outcomes of the project, and determine who is accountable for each of the required actions Top_down
The ... project is the origin of today's Internet Arpanet
The history of information security begins with the history of...security. computer
An...information security policy outlines the implementation of a security program within the organization. enterprise
The internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected Local Area... Network
Information has...when it is whole, complete, and uncorrupted. Integrity
The senior technology officer is typically the chief ... officer. Executive
A...is a group of individuals who are united by similar interests or values within an organization and who share a common goal of making the organization function to meet its objectives. community of interest
...ensures authorized users - persons or computer systems can access information without interference or obstruction, and in the required format. Availability
During the early years, inf security was a straight forward process composed predominantly of ... security and simple document classification schemes. physical
A computer is the...of an attack when it is used as an active tool to con dict the attack subject
the NSTISSC model of information security evolved from a concept developed by the computer security industry known as the...triangle C.I.A

Are you studying for the CISSP certification?

Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.

What is the quality or state of being genuine or original rather than a reproduction or fabrication?

Skillset helps you pass your certification exam.

What is the quality or state of being genuine or original rather than a reproduction or fabrication?

Practice Questions

Study thousands of practice questions that organized by skills and ranked by difficulty.

What is the quality or state of being genuine or original rather than a reproduction or fabrication?

Personalized Training

Create a tailored training plan based on the knowledge you already possess.

What is the quality or state of being genuine or original rather than a reproduction or fabrication?

Exam Readiness

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Get A Free Skillset Account

Front Back

Information has ______ when it is whole, complete, and uncorrupted.

Integrity

In an organization, the value of _________ of information is especially high when it involves personal information about employees, customers, or patients.

Confidentiality

A computer is the _______ of an attack when it is the target entity.

Object

In the ___ _____ approach, the project is initiated by upper-level managers who issue policy, procedures and processes, dictate the goals and expected outcomes, and determine accountability for each required action.

Top-down

During the ____ War, many mainframes were brought online to accomplish more complex and sophisticated tasks so it became necessary to enable the mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers.

Cold

The ______ component of the IS comprises applications, operating systems, and assorted command utilities.

Software

The senior technology officer is typically the chief ______ officer.

Information

A frequently overlooked component of an IS, _____ are written instructions for accomplishing a specific task.

Procedures

The CNSS model of information security evolved from a concept developed by the computer security industry known as the _____ triangle.

CIA

A(n) _______ information security policy outlines the implementation of a security program within the organization.

Enterprise

A(n) ________ is a formal approach to solving a problem by means of a structured sequence of procedures.

Methodology

The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area ______ .

Network

The ______ of information is the quality or state of ownership or control of some object or item.

Possession

________ of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.

Authenticity

_________ enables authorized users — persons or computer systems — to access information without interference or obstruction and to receive it in the required format.

Availability

Which of the following refers to the state of being uncorrupted?

Integrity. The quality or state of being whole, complete, and uncorrupted. Methodology. A formal approach to solving a problem based on a structured sequence of procedures. object of an attack.

What type of security that protects physical items objects or areas from unauthorized access and misuse?

The protection of tangible items, objects, or areas from unauthorized access and misuse is known as _____. Physical security.
Principles of information security.

When information is whole complete and uncorrupted?

In Information Security, Integrity is when an information is whole, complete, and uncorrupted.