Computer Science 202: Network and System Security  /  Computer Science Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Information Security Overview Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Processes and actions taken to implement the requirements in the policy documents is called _____

Question 2 2. An example of an information security policy document consists of the following components

Question 3 3. The purpose of a Business Continuity Plan Policy is to _____

Question 4 4. In regards to information security, which of the following is part of identity and access management?

Question 5 5. What is the purpose of security operations in regards to information security?

Page 2

Question 6 6. Why does data need to have a recorded owner?

Question 7 7. The defense in depth approach to IT security is also known as the 'castle approach' because:

Question 8 8. A well-written security policy will NOT directly protect an organization's:

Question 9 9. Which of the following is not a method where a security policy would protect an employee?

Question 10 10. Fire is an example of a _____ information security threat.

Page 3

Question 11 11. Information security threats can be _____.

Question 12 12. _____ is anything that can negatively affect information.

Question 13 13. What would be an example of a violation of the principle of confidentiality?

Question 14 14. The _____ ensures that people only have access to the information they need to do their jobs.

Question 15 15. What is the main idea behind the principle of availability in information security?

Page 4

Question 16 16. Which of the following is NOT a benefit of an information management security system?

Question 17 17. Which of the following is NOT an example of an information security management policy or procedure?

Question 18 18. Which of the following information security management system benefits deals with continuous improvement?

Question 19 19. A collection of standardized policies, procedures and guides, meant to direct a firm or any organization, which adopts its use, on how to protect its infrastructure from security breaches is called _____

Question 20 20. The main reason for using an information security framework are as follows _____

Page 5

Question 21 21. To ensure that the information security framework is well implemented and aligns with the business needs of Best Stocks, the following best practices as defined by the industry's professional bodies are observed _____

Question 22 22. What are the three principles of the information security CIA triad?

Question 23 23. Which of the following best describes availability as it relates to information security?

Question 24 24. Which of the following would you NOT consider to be information?

Question 25 25. An information plan is a detailed account of the _____, _____, and _____ of information security at an organization.

Page 6

Question 26 26. Which of the following is NOT a section in an information security plan?

Question 27 27. _____ is the process of investigating and identifying the source, effects, and mitigation of any threat when it occurs.

Question 28 28. Information security policy documents include _____

Question 29 29. Why should security testing be a part of information security requirements?

Question 30 30. Data needs to be safeguarded from all of the following except:

Information Security Overview Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support