IT 323 Reviewer

IT 323 Reviewer

University

91 Qs

quiz-placeholder

Similar activities

ICT 198-289

ICT 198-289

University

90 Qs

PRJ301

PRJ301

University

95 Qs

قواعد 9

قواعد 9

University

93 Qs

spi final reviewer

spi final reviewer

University

93 Qs

CCNA

CCNA

University

95 Qs

CCNA Exam

CCNA Exam

University

95 Qs

CCNA Introduction to Networking

CCNA Introduction to Networking

University

95 Qs

Quiz-1-22BCA2-Group-B-Web-development

Quiz-1-22BCA2-Group-B-Web-development

University

92 Qs

IT 323 Reviewer

IT 323 Reviewer

Assessment

Quiz

Computers

University

Medium

Created by

CHARLES MAGSINO

Used 1+ times

FREE Resource

91 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

a “well-informed sense of assurance that the information risks and controls are in balance.”

Security professionals must review the origins of this field to understand its impact on our understanding of information security today

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Original communication by mailing tapes

Advanced Research Project Agency (ARPA)

Examined feasibility of redundant networked communications

Larry Roberts developed ARPANET from its inception

ARPANET is predecessor to the Internet

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

ARPANET grew in popularity

Potential for misuse grew

Fundamental problems with ARPANET security

Individual remote sites were not secure from unauthorized users

Vulnerability of password structure and formats

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Early focus of computer security research

System called Multiplexed Information and Computing Service

First operating system created with security as its primary goal
Mainframe, time-sharing OS developed in mid-1960s

GE, Bell Labs, and MIX

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Networks of computers became more common

Need to interconnect networks grew

Internet became first manifestation of a global network of networks

Initially based on de facto standards

In early Internet deployments, security was treated as a low priority

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Millions of computer networks communicate

Many of the communication unsecured

Ability to secure a computer’s data influenced by the security of every computer to which it is connected

Growing threat of cyber attacks has increased the need for improved security

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • - The quality or state of being secure—to be free from danger

  • - protection of information and its critical elements

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?