Security & IntelligenceAnswer Key

Information Security Can Be An Absolute

20 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

The primary threats to security during the early years of computers were physical theft of equipment, espionage against the products of the systems, and sabotage.

ANSWER

True

QUESTION 2

Network security focuses on the protection of the details of a particular operation or series of activities.

ANSWER

False Network Security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies.

QUESTION 3

The value of information comes from the characteristics it possesses.

ANSWER

True

QUESTION 4

When a computer is the subject of an attack, it is the entity being attacked.

ANSWER

False When the subject of an attack, computer is used as an active tool to conduct attack.

QUESTION 5

An e-mail virus involves sending an e-mail message with a modified field.

ANSWER

False

QUESTION 6

The possession of information is the quality or state of having value for some purpose or end.

ANSWER

False

QUESTION 7

A breach of possession always results in a breach of confidentiality.

ANSWER

False

QUESTION 8

Hardware is often the most valuable asset possessed by an organization and it is the main target of intentional attacks.

ANSWER

False

QUESTION 9

Information security can be an absolute

ANSWER

False

QUESTION 10

To achieve balance — that is, to operate an information system that satisfies the user and the security professional — the security level must allow reasonable access, yet protect against threats.

ANSWER

True

QUESTION 11

The bottom-up approach to information security has a higher probability of success then the top-down approach.

ANSWER

False

QUESTION 12

Using a methodology increases the probability of success.

ANSWER

True

QUESTION 13

The Implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

ANSWER

False The Maintenance Phase is.

QUESTION 14

The investigation phase of the SecSDLC begins with a directive from upper management.

ANSWER

True

QUESTION 15

The physical design is the blue print for the desired solution.

ANSWER

False

QUESTION 16

Recently, many states have implemented legislation making certain computer-related activities illegal.

ANSWER

True

QUESTION 17

Applications systems developed within the framework of traditional SDLC are designed to anticipate a software attack that requires some degree of application reconstruction.

ANSWER

False

QUESTION 18

A champion is a project manager, who may be a departmental line manager or staff unit manager, and understands project management, personnel management, and information security technical requirements.

ANSWER

False

QUESTION 19

A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.

ANSWER

True

QUESTION 20

The roles of information security professionals are aligned with the goals and mission of the information security community of interest.

ANSWER

True

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials