InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
How Human Error Can Be Prevented? |
|
Answer» Much human error or failure can be prevented with training and ongoing AWARENESS activities,but ALSO with controls,ranging from simple procedures like asking USERS to type a critical command twice,to more complex procedures ,such as the verification of the commands by a second party(Eg KEY recovery actions in PKI SYSTEMS). Much human error or failure can be prevented with training and ongoing awareness activities,but also with controls,ranging from simple procedures like asking users to type a critical command twice,to more complex procedures ,such as the verification of the commands by a second party(Eg key recovery actions in PKI systems). |
|
| 102. |
What Are Different Acts Of Human Error Or Failure? |
|
Answer» Includes acts done without MALICIOUS INTENT. It is Caused by:
Includes acts done without malicious intent. It is Caused by: |
|
| 103. |
What Are Threats? |
|
Answer» A threat is an OBJECT, person, or other ENTITY that represents a constant danger to an asset MANAGEMENT must be informed of the various kinds of threats facing the organization By examining each threat category in turn, management EFFECTIVELY protects its information through policy, education and training, and technology controls. A threat is an object, person, or other entity that represents a constant danger to an asset Management must be informed of the various kinds of threats facing the organization By examining each threat category in turn, management effectively protects its information through policy, education and training, and technology controls. |
|
| 104. |
What Are The Four Important Functions, The Information Security Performs In An Organization? |
|
Answer» Information SECURITY performs four important FUNCTIONS for an organization:
Information security performs four important functions for an organization: |
|
| 105. |
Define E-mail Spoofing ? |
|
Answer» INFORMATION is AUTHENTIC when the contents are original as it was CREATED,palced or stored or transmitted.The information you receive as e-mail may not be authentic when its contents are MODIFIED what is KNOWN as E-mail spoofing. Information is authentic when the contents are original as it was created,palced or stored or transmitted.The information you receive as e-mail may not be authentic when its contents are modified what is known as E-mail spoofing. |
|
| 106. |
What Is Arpanet? |
|
Answer» Department of Defense in US,STARTED a research program on feasibility of a REDUNDANT,networked communication system to SUPPORT the military's exchange of information.Larry Robers,known as the founder if internet ,DEVELOPED the project from its inception. Department of Defense in US,started a research program on feasibility of a redundant,networked communication system to support the military's exchange of information.Larry Robers,known as the founder if internet ,developed the project from its inception. |
|
| 107. |
What Is Multics? |
|
Answer» MULTICS was an OPERATING system ,now obsolete. MULTICS is noewothy because it was the FIRST and only OS created with security as its primary goal. It was a MAINFRAME ,time-sharing OS developed in mid - 1960s by a consortium from GE,Bell Labs,and MIT. MULTICS was an operating system ,now obsolete. MULTICS is noewothy because it was the first and only OS created with security as its primary goal. It was a mainframe ,time-sharing OS developed in mid - 1960s by a consortium from GE,Bell Labs,and MIT. |
|
| 108. |
What Is Security Blue Print? |
|
Answer» The security blue print is the PLAN for the implementation of new security measures in the ORGANIZATION. Some TIMES called a framework,the blue print presents an organized approach to the security planning PROCESS. The security blue print is the plan for the implementation of new security measures in the organization. Some times called a framework,the blue print presents an organized approach to the security planning process. |
|
| 109. |
What Is Hacking? |
|
Answer» Hacking can be defined POSITIVELY and NEGATIVELY. To writes COMPUTER PROGRAMS for ENJOYMENT to gain access to a computer illegally. Hacking can be defined positively and negatively. To writes computer programs for enjoyment to gain access to a computer illegally. |
|
| 110. |
What Is Attack? |
|
Answer» An attack is an intentional or unintentional attempt to cause damage or otherwise COMPROMISE the information. If some one casually reads SENSITIVE information not intended for his or her USE ,this considered as a passive attack. If a HACKER attempts to break into an information system,the attack is considered ACTIVE. An attack is an intentional or unintentional attempt to cause damage or otherwise compromise the information. If some one casually reads sensitive information not intended for his or her use ,this considered as a passive attack. If a hacker attempts to break into an information system,the attack is considered active. |
|
| 111. |
What Is The Difference Between Vulnerability And Exposure? |
|
Answer» The exposure of an information SYSTEM is a single instance when the system is open to DAMAGE. Weakness or faults in a system EXPOSE information or protection mechanism that expose information to ATTACK or damage or known as vulnerabilities. The exposure of an information system is a single instance when the system is open to damage. Weakness or faults in a system expose information or protection mechanism that expose information to attack or damage or known as vulnerabilities. |
|
| 112. |
What Is The Difference Between A Threat Agent And A Threat? |
|
Answer» A THREAT is a CATEGORY of objects,persons,or other entities that pose a POTENTIAL danger to an asset. Threats are always present. A threat AGENT is a specific instance or component of a threat. (For example All hackers in the world are a collective threat Kevin Mitnick,who was convicted for hacking into PHONE systems was a threat agent.) A threat is a category of objects,persons,or other entities that pose a potential danger to an asset. Threats are always present. A threat agent is a specific instance or component of a threat. (For example All hackers in the world are a collective threat Kevin Mitnick,who was convicted for hacking into phone systems was a threat agent.) |
|
| 113. |
What Are The Three Types Of Data Ownwership And Their Responsibilities? |
|
Answer» Data Owner - responsible for the security and use of a PARTICULAR set of INFORMATION Data Custodian - responsible for the storage, MAINTENANCE, and protection of the information Data Users - the end SYSTEMS users who work with the information to PERFORM their daily jobs supporting the mission of the organization. Data Owner - responsible for the security and use of a particular set of information Data Custodian - responsible for the storage, maintenance, and protection of the information Data Users - the end systems users who work with the information to perform their daily jobs supporting the mission of the organization. |
|
| 114. |
What Are The Information Security Roles To Be Played By Various Professionals In A Typical Organization? |
Answer»
|
|
| 115. |
How Information Security Is Viewed As A Social Science? |
|
Answer» Social science examines the behavior of INDIVIDUALS interacting with systems SECURITY begins and ends with the people that interact with the system End users may be the weakest link in the security chain Security administrators can GREATLY reduce the levels of risk CAUSED by end users, and create more acceptable and supportable security profiles. Social science examines the behavior of individuals interacting with systems Security begins and ends with the people that interact with the system End users may be the weakest link in the security chain Security administrators can greatly reduce the levels of risk caused by end users, and create more acceptable and supportable security profiles. |
|
| 116. |
What Is Security Sdlc? |
Answer»
|
|
| 117. |
Explain Different Phases Of Sdlc ? |
|
Answer» Investigation, ANALYSIS, Logical Design, PHYSICAL Design, Implementation,MAINTENANCE and CHANGE. Investigation, Analysis, Logical Design, Physical Design, Implementation,Maintenance and Change. |
|
| 118. |
What Is Sdlc? |
| Answer» | |
| 119. |
What Are The Approaches Used For Implementing Information Security? |
| Answer» | |
| 120. |
What Is Meant By Balancing Security And Access? |
Answer»
|
|
| 121. |
What Are The Components Of An Information System? |
|
Answer» An Information System (IS) is much more than computer HARDWARE; it is the ENTIRE SET of software, hardware, DATA, people, and procedures necessary to use information as a RESOURCE in the organization. An Information System (IS) is much more than computer hardware; it is the entire set of software, hardware, data, people, and procedures necessary to use information as a resource in the organization. |
|
| 122. |
What Is Nstissc Security Model? |
|
Answer» This refers to "The NATIONAL Security Telecommunications and INFORMATION SYSTEMS Security Committee" document. This document presents a comprehensive model for information security. The model consists of three dimensions. This refers to "The National Security Telecommunications and Information Systems Security Committee" document. This document presents a comprehensive model for information security. The model consists of three dimensions. |
|
| 123. |
What Are The Critical Characteristics Of Information? |
Answer»
|
|
| 124. |
Define Information Security ? |
|
Answer» INFORMATION security - is the PROTECTION of information and its CRITICAL elements, INCLUDING the systems and hardware that use, store, and transmit the information. Information security - is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit the information. |
|
| 125. |
Define Network Security ? |
|
Answer» Network SECURITY - is the protection of networking COMPONENTS,CONNECTIONS,and contents. Network security - is the protection of networking components,connections,and contents. |
|
| 126. |
Define Communications Security ? |
|
Answer» COMMUNICATIONS SECURITY - encompasses the protection of organization's communications MEDIA, TECHNOLOGY and CONTENT. Communications security - encompasses the protection of organization's communications media, technology and content. |
|
| 127. |
Define Operations Security ? |
|
Answer» Operations security focuses on the protection of the DETAILS of PARTICULAR operations or SERIES of activities. Operations security focuses on the protection of the details of particular operations or series of activities. |
|
| 128. |
Define Personal Security ? |
|
Answer» Personal Security INVOLVES protection of INDIVIDUALS or group of individuals who are AUTHORIZED to ACCESS the organization and its OPERATIONS. Personal Security involves protection of individuals or group of individuals who are authorized to access the organization and its operations. |
|
| 129. |
Define Physical Security ? |
|
Answer» Physical Security - to protect physical items, OBJECTS or AREAS of organization from UNAUTHORIZED ACCESS and misuse. Physical Security - to protect physical items, objects or areas of organization from unauthorized access and misuse. |
|
| 130. |
What Is The Scope Of Computer Security? |
|
Answer» The SCOPE of COMPUTER security grew from physical security to include:
The scope of computer security grew from physical security to include: |
|
| 131. |
What Is Rand Report R-609? |
|
Answer» INFORMATION Security began with RAND Corporation Report R-609, The Rand Report was the first widely recognized PUBLISHED document to identify the ROLE of management and policy issues in COMPUTER security. Information Security began with Rand Corporation Report R-609, The Rand Report was the first widely recognized published document to identify the role of management and policy issues in computer security. |
|
| 132. |
Write A Note On The History Of Information Security ? |
|
Answer» Computer security began immediately after the first mainframes were developed Groups developing code-breaking computations during World War II created the first modern COMPUTERS Physical controls were needed to limit access to authorized PERSONNEL to sensitive military locations Only RUDIMENTARY controls were available to defend against physical theft, espionage, and SABOTAGE. Computer security began immediately after the first mainframes were developed Groups developing code-breaking computations during World War II created the first modern computers Physical controls were needed to limit access to authorized personnel to sensitive military locations Only rudimentary controls were available to defend against physical theft, espionage, and sabotage. |
|
| 133. |
What Is C.i.a? |
|
Answer» The C.I.A. TRIANGLE was the standard based on confidentiality, INTEGRITY, and availability. The C.I.A. triangle has expanded into a LIST of CRITICAL characteristics of information. The C.I.A. triangle was the standard based on confidentiality, integrity, and availability. The C.I.A. triangle has expanded into a list of critical characteristics of information. |
|